In a malware context. Command and Control (C2) is a collection of methods and software used to communicate with and control infected hosts.
Many C2 solutions are documented in the C2 Matrix: https://howto.thec2matrix.com/ https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0
Links to this note
- Main Index
- anatomyofreallinuxintrusion-alonso2016
- trackingteamtnt-fiser2021
- evasionbydeoptimization-balci2024
- gammagroupwriteup-fisher2014
- hackingteamwriteup-fisher2016
- chaos-blacklotuslabs2022
- borges2021
- sshbackdors-dumont2018
- falseflags-kaspersky2017
- sansec-cronrat
- attackofthings-level3-2016
- Beacon
- Brute Ratel
- bvp47-pangulab2022
- callback (command and control)
- callback jitter
- callback scheduling
- Cobalt Strike
- Covenant
- decentralized
- Discord-based C2
- DNS C2
- Domain Generation Algorithm
- equationdeathstar-great2015
- evadingedr-hand2024
- hiddenwasp-intezer2019
- HTTP C2
- incidentresponse-luttgens2014
- IRC command and control
- Kaiten malware
- linuxapts-great2020
- Main Index - C
- malicious domain
- malware gathering system information
- merlin c2
- meterpreter
- miraisourceleaked-krebs2016
- multiplayer (command and control)
- Mythic
- sliver c2
- sliverintro-malone2023
- stealthshell-petrich2024
- toroiseandthemalwahare-pwc2023
- tricephalichellkeeper-pourcelot2022
- Tsunami malware
- unpacking diicot-tikochinski2024
- unveiling wolfsbane-sperka2024
- XORDDOS malware