In a malware context. Command and Control (C2) is a collection of methods and software used to communicate with and control infected hosts.
Many C2 solutions are documented in the C2 Matrix:
https://howto.thec2matrix.com/
https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0
Links to this note
- attribution-steffens2020
- Linux Persistence: Processes
- Apfell
- Main Index
- toroiseandthemalwahare-pwc2023
- equationdeathstar-great2015
- hiddenwasp-intezer2019
- sliverintro-malone2023
- incidentresponse-luttgens2014
- tricephalichellkeeper-pourcelot2022
- anatomyofreallinuxintrusion-alonso2016
- bvp47-pangulab2022
- attackofthings-level3-2016
- trackingteamtnt-fiser2021
- miraisourceleaked-krebs2016
- unpacking diicot-tikochinski2024
- unveiling wolfsbane-sperka2024
- evasionbydeoptimization-balci2024
- gammagroupwriteup-fisher2014
- hackingteamwriteup-fisher2016
- chaos-blacklotuslabs2022
- evadingedr-hand2024
- borges2021
- stealthshell-petrich2024
- sshbackdors-dumont2018
- linuxapts-great2020
- falseflags-kaspersky2017
- sansec-cronrat
- Beacon
- Brute Ratel
- callback (command and control)
- callback jitter
- callback scheduling
- Cobalt Strike
- Covenant
- decentralized
- Discord-based C2
- DNS C2
- Domain Generation Algorithm
- HTTP C2
- IRC command and control
- Kaiten malware
- Main Index - C
- malicious domain
- malware gathering system information
- merlin c2
- meterpreter
- multiplayer (command and control)
- Mythic
- sliver c2
- Tsunami malware
- XORDDOS malware