Master Finance Tools - 35% Off CFI (Code CFI35)
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Discover how a single Outlook registry setting sparked the development of a powerful Command and Control (C2) framework in this 39-minute conference talk from x33fcon. Follow the fascinating journey of TrustedSec's red team operations as they transformed a minor registry modification affecting Outlook's behavior into a sophisticated cybersecurity tool used against some of the world's largest companies. Learn about the research and development process behind creating custom red team tools, gaining rare insights into professional penetration testing methodologies and real-world attack scenarios. Explore how this C2 framework became a cornerstone of TrustedSec's toolkit over three years of challenging engagements, with practical demonstrations of its capabilities and applications. Understand the technical details of how small system modifications can lead to significant security implications, while gaining valuable perspective on the tools and techniques employed by professional red teams in enterprise environments.
Syllabus
4. Oddvar Moe: Redteam Chronicles: A C2 Story - Outlook's One-Setting Wonder
Taught by
x33fcon