<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>C2 Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/c2/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/c2</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Thu, 12 Jan 2023 19:27:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.3</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>C2 Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/c2</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar takeaway &#8211; Shellcode Execution with Python</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 19:27:44 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[shellcode]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1038</guid>

					<description><![CDATA[<p>teaser for this Webcast, which made me attend Imagine you are pen testing a company and gain access to a Windows application server. You discover the server has application allow listing deployed, and strong EDR/XDR defensive solutions. To your excitement, you find there is a Python interpreter installed. It would be really great if you [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python">Webinar takeaway &#8211; Shellcode Execution with Python</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; The Ins and Outs of RITA</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 19:21:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[beacon]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[packet capture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=946</guid>

					<description><![CDATA[<p>My key takeaways RITA is made to detect beacons and long connections open source tool Signature based detection of malicious code is outdated Average detect time is over 6 month > 50% of compromised systems are detected by outsiders RITA is behaviour based Needs a bunch of pakets to work on min 1h, default 24h [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita">Webinar takeaway &#8211; The Ins and Outs of RITA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; Malware of the Day</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 02 Mar 2022 20:27:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[beacon]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[home network]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=875</guid>

					<description><![CDATA[<p>My key takeaways &#34;Malware of the Day&#34; is about simulating one malware or exploit that was found &#34;in the wild&#34; why? to share with the public so that we can test our security detection abilities in place sharing (safe) PCAPs with identified C2 methods and network traffic patterns smoke detectors are not build to prevent [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day">Webinar takeaway &#8211; Malware of the Day</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Network Protocol Abuse – How Attackers Profit by Playing by the Rules</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-network-protocol-abuse-how-attackers-profit-by-playing-by-the-rules</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-network-protocol-abuse-how-attackers-profit-by-playing-by-the-rules#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 28 Jul 2021 18:07:49 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Network+]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=538</guid>

					<description><![CDATA[<p>My key takeaways Analogie: north = ingress traffic south = outgress traffic east-west = lateral movement HTTP is born in 1996 HTTP status code 418: &#34;I&#8217;m a teapot&#34; The HTTP 418 I&#8217;m a teapot client error response code indicates that the server refuses to brew coffee because it is, permanently, a teapot. A combined coffee/tea [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-network-protocol-abuse-how-attackers-profit-by-playing-by-the-rules">Webinar takeaway: Network Protocol Abuse – How Attackers Profit by Playing by the Rules</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-network-protocol-abuse-how-attackers-profit-by-playing-by-the-rules/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: How to Cover C&#038;C in the MITRE ATT&#038;CK Matrix</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 17 Nov 2020 16:43:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=251</guid>

					<description><![CDATA[<p>My key takeaways Modern threats are almost impossible to detect by signatures or heuristics command and control channels (C2) now are often using common encryption like https so content analysis is not an option either Well known and legit websites are abused as C2 channels like Google Mail or O365 Even CDNs are used as [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix">Webinar takeaway: How to Cover C&#038;C in the MITRE ATT&#038;CK Matrix</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-cover-cc-in-the-mitre-attck-matrix/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
