Application Layer Protocol for C2 and Exfil to Cloud

0
Language

Level

Beginner

Access

Paid

Certificate

Paid

Threat actors like APT29 use Application Layer Protocols for Command and Control (C2) so they can blend in and avoid detection. They also may attempt to steal data and exfiltrate it to a cloud storage service as the end-goal of their attack. In this course, you will learn about these techniques and get practice detecting them in our virtual lab.

Add your review

Course Description

Command and Control (“C2”) is the general group of techniques used to establish and conduct remote communication with assets, applications and environments under unauthorized control.

This course will focus on the use of techniques that use C2. The Application Layer Protocol: Web Protocol sub-technique uses web-related network protocols such as HTTP for communication channels for C2. Web protocols are among those most likely to be broadly allowed for outbound communication through a firewall, even for more strictly controlled environments.

Exfiltration is an exceptionally common tactic and involves the unauthorized extraction or theft of data from a target system, network or application. Even during an attack where data theft is not the primary objective, the adversary may need to extract data necessary to execute other techniques. For example, an adversary may need to collect password hashes to attempt an offline crack. This method of data collection or extraction is often referred to as “exfiltration”.

Learn how to detect and mitigate these techniques to protect your organization from this highly sophisticated type of attack.

Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the threat group APT29. Prevent adversaries from accomplishing the tactics of Command and Control and Exfiltration.

Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the threat group APT29. Prevent adversaries from accomplishing the tactics of Command and Control and Exfiltration.

Module 1: APT29 Introduction

Module 2: Application Layer Protocol for C2 and Exfil over C2

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Application Layer Protocol for C2 and Exfil to Cloud”

×

    Your Email (required)

    Report this page
    Application Layer Protocol for C2 and Exfil to Cloud
    Application Layer Protocol for C2 and Exfil to Cloud
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.