Unknown malware on a users computer
|
Malware pivots |
25 |
|
Brute Ratel
|
Offensive Security Tools Continued |
80 |
|
Geolocating the C2 Infrastructure
|
OST Tools |
70 |
|
Identifying Common Traits of These C2 Servers
|
OST Tools |
60 |
|
Havoc Framework C2 Profiling
|
OST Tools |
50 |
|
SSL Certificate Tracking
|
OST Tools |
40 |
|
Attribution of the C2 Server
|
OST Tools |
20 |
|
Identifying the Command-and-Control (C2) Server
|
OST Tools |
10 |
|
Expanding the Hunt
|
RAT |
40 |
|
Identifying RAT Activity in UK CNI Networks
|
RAT |
30 |
|
A Familiar Face in the Dark
|
RAT |
10 |
|