Back to all projects





61173923
Part 18: Understanding Command and Control (C2)
2024-11-18
Samson Otori
Personal Project
Blue Team

Project Gallery

C2
Mythic
Security
SOC
Threat Detection
Continue Reading
PreviousProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 17 of 30

Part 17: Building a Dashboard for RDP And SSH Activity
Day 17 of the 30-Day MYDFIR SOC Analyst Challenge: Creating comprehensive dashboards to monitor and analyze RDP and SSH authentication atte…
Nov 17, 2024
Read previous
NextProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 19 of 30

Part 19: Creating an Attack Diagram
Day 19 of the 30-Day MYDFIR SOC Analyst Challenge: Mapping out a comprehensive attack plan using Draw.io, from initial access to data exfil…
Nov 19, 2024
Read next
Related Projects
Oldest Projects
Newest Projects

Blue Team
Project 6.4: Agent-Based Vulnerability Monitoring on Linux with Tenable Nessus Agent
Dec 5Project

Blue Team
Project 6.3: Agent-Based Monitoring on Windows 11 Using Tenable Nessus Agents
Nov 28Project

Blue Team
Project 6.2: LOG(N) Pacific Internship – Windows 11 Compliance Scanning Using a Custom Tenable Scan Template
Nov 25Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure