Back to all projects





61173923
Part 20: Setting Up Mythic C2
2024-11-20
Samson Otori
Personal Project
Blue Team

Project Gallery

Mythic
C2
SOC
Security
Cloud Security
Continue Reading
PreviousProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 19 of 30

Part 19: Creating an Attack Diagram
Day 19 of the 30-Day MYDFIR SOC Analyst Challenge: Mapping out a comprehensive attack plan using Draw.io, from initial access to data exfil…
Nov 19, 2024
Read previous
NextProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 21 of 30

Part 21: Brute Force Attack & Establishing a C2 Session
Day 21 of the 30-Day MYDFIR SOC Analyst Challenge: Executing a brute force attack, generating a Mythic agent, and establishing a Command an…
Nov 21, 2024
Read next
Related Projects
Oldest Projects
Newest Projects

Blue Team
Project 6.4: Agent-Based Vulnerability Monitoring on Linux with Tenable Nessus Agent
Dec 5Project

Blue Team
Project 6.3: Agent-Based Monitoring on Windows 11 Using Tenable Nessus Agents
Nov 28Project

Blue Team
Project 6.2: LOG(N) Pacific Internship – Windows 11 Compliance Scanning Using a Custom Tenable Scan Template
Nov 25Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure