C D W
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec glossary
  • Home
  • |
  • Tag: C2

Security

Webinar takeaway – Malware of the Day

My key takeaways "Malware of the Day" is about simulating one malware or exploit ...

Read More

Code, Security

Webinar takeaway – Shellcode Execution with Python

teaser for this Webcast, which made me attend Imagine you are pen testing a ...

Read More

Security

Webinar takeaway – The Ins and Outs of RITA

My key takeaways RITA is made to detect beacons and long connections open source ...

Read More

Security

Webinar takeaway: How to Cover C&C in the MITRE ATT&CK Matrix

My key takeaways Modern threats are almost impossible to detect by signatures or heuristics ...

Read More

Security

Webinar takeaway: Network Protocol Abuse – How Attackers Profit by Playing by the Rules

My key takeaways Analogie: north = ingress traffic south = outgress traffic east-west = ...

Read More
Load More

Copyright 2025 Jean-Christoph von Oertzen - Privacy policy - Imprint