Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore cutting-edge research on Windows Command and Control (C2) communications in this 36-minute conference talk from x33fcon. Learn advanced techniques for abusing Windows page guard permissions to conceal data and bypass named pipes, while developing a modular approach to C2 implementation. Discover how to circumvent EDR detection, leverage built-in Microsoft features, and implement C++ solutions for enhanced stealth. Gain practical insights into designing customizable and modular Windows C2 systems that operate under the radar, complete with code samples and implementation strategies. Examine existing research and emerging techniques for hiding communications in plain sight, with a focus on general methodologies that can be readily adapted to custom C2 tooling.