Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Redteam Chronicles - A C2 Story - Outlook's One-Setting Wonder

x33fcon via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Discover how a single Outlook registry setting sparked the development of a powerful Command and Control (C2) framework in this 39-minute conference talk from x33fcon. Follow the fascinating journey of TrustedSec's red team operations as they transformed a minor registry modification affecting Outlook's behavior into a sophisticated cybersecurity tool used against some of the world's largest companies. Learn about the research and development process behind creating custom red team tools, gaining rare insights into professional penetration testing methodologies and real-world attack scenarios. Explore how this C2 framework became a cornerstone of TrustedSec's toolkit over three years of challenging engagements, with practical demonstrations of its capabilities and applications. Understand the technical details of how small system modifications can lead to significant security implications, while gaining valuable perspective on the tools and techniques employed by professional red teams in enterprise environments.

Syllabus

4. Oddvar Moe: Redteam Chronicles: A C2 Story - Outlook's One-Setting Wonder

Taught by

x33fcon

Reviews

Start your review of Redteam Chronicles - A C2 Story - Outlook's One-Setting Wonder

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.