logo
  • About
  • Contact
  • Hall of fame

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Google Confirms 75 Zero-Day Attacks: Phones And Browsers Were Targeted
  • Mitre warns over lapse in CVE coverage
  • Over 200 Million Records Allegedly Belonging to X Leaked Online
  • Catastrophic hack of AT&T and Verizon is proof Apple is right about iPhone encryption
  • Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers

Video

Video Player
https://www.youtube.com/watch?v=wMsHDH67eb4
00:00
00:00
01:18
Use Up/Down Arrow keys to increase or decrease volume.

RSS NVD Data Feed

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Understanding & Detecting C2 Frameworks — DarkFinger-C2

Posted on 4 July 2021

From malware.news

Understanding & Detecting C2 Frameworks — DarkFinger-C2

Hello and welcome to part 5 of “Understanding & Detecting C2 Frameworks”. You can read the previous blog posts below

  • Understanding & Detecting C2 Frameworks — TrevorC2
  • Understanding & Detecting C2 Frameworks — Ares
  • Understanding & Detecting C2 Frameworks — HARS (HTTP/S Asynchronous Reverse Shell)
  • Understanding & Detecting C2 Frameworks — BabyShark

Today we’re going to analyze the C2 PoC “DarkFinger”

Read more…

Posted in News

Post navigation

Previous post: Week in review: PoC for Windows Print Spooler flaw leaked, conquering synthetic identity fraud
Next post: 10 Best Vulnerability Scanning Tools For Penetration Testing – 2021
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.