C D W
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec glossary
  • Home
  • |
  • Tag: C2

networking, vulnerabilities, threats, attacks and countermeasures

C2

C2: Command and Control (server|connection) Command and Control (C2) refers to the infrastructure and ...

Read More

networking

DoH

DoH: DNS over HTTPS […] the requests are placed inside of an encrypted HTTPS ...

Read More

networking

DoT

DoT: DNS over TLS takes standard DNS requests and places them inside a TLS ...

Read More

Security

Webinar takeaway – Malware of the Day

My key takeaways "Malware of the Day" is about simulating one malware or exploit ...

Read More

Code, Security

Webinar takeaway – Shellcode Execution with Python

teaser for this Webcast, which made me attend Imagine you are pen testing a ...

Read More

Security

Webinar takeaway – The Ins and Outs of RITA

My key takeaways RITA is made to detect beacons and long connections open source ...

Read More
Load More

Copyright 2025 Jean-Christoph von Oertzen - Privacy policy - Imprint