Skip to Content
Hands-On Red Team Tactics
book

Hands-On Red Team Tactics

by Himanshu Sharma, Harpreet Singh
September 2018
Intermediate to advanced
480 pages
9h 45m
English
Packt Publishing
Content preview from Hands-On Red Team Tactics

C2 - Master of Puppets

Almost everyone who is involved with cybersecurity will already have a clear idea about what a Command and Control server is. In case you don't know, a Command and Control server, also known as a C&C or a C2, is generally used in cyberattacks. It is a system that controls all the infected systems (the bots or zombies) that were infected by the attacker in a malware or phishing attack. A C2 is controlled by an attacker and is used to send commands to perform different tasks such as a DDoS attack, spamming, stealing data from bots, or spreading malware. The question remains, therefore, if C2s are used by cyber criminals to execute a cyberattack, does that makes Red Team operations illegal?

Many people still have a misunderstanding ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Storytelling with You

Storytelling with You

Cole Nussbaumer Knaflic
The Manager's Path

The Manager's Path

Camille Fournier
Crucial Conversations

Crucial Conversations

Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory

Publisher Resources

ISBN: 9781788995238Other