Back to all projects





57133923
Part 20: Setting Up Mythic C2
2024-11-20
Samson Otori
Personal Project
Blue Team

Project Gallery

Mythic
C2
SOC
Security
Cloud Security
Continue Reading
PreviousProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 19 of 30

Part 19: Creating an Attack Diagram
Day 19 of the 30-Day MYDFIR SOC Analyst Challenge: Mapping out a comprehensive attack plan using Draw.io, from initial access to data exfil…
Nov 19, 2024
Read previous
NextProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 21 of 30

Part 21: Brute Force Attack & Establishing a C2 Session
Day 21 of the 30-Day MYDFIR SOC Analyst Challenge: Executing a brute force attack, generating a Mythic agent, and establishing a Command an…
Nov 21, 2024
Read next
Related Projects
Oldest Projects
Newest Projects

Blue Team
Project 6.0: LOG(N) Pacific Internship – Vulnerability Management: Windows Authenticated vs Unauthenticated Scanning with Tenable
Nov 21Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Nov 17Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 1: Malicious Activity Simulation)
Nov 17Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure