Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Discover how a single Outlook registry setting sparked the development of a powerful Command and Control (C2) framework in this 39-minute conference talk from x33fcon. Follow the fascinating journey of TrustedSec's red team operations as they transformed a minor registry modification affecting Outlook's behavior into a sophisticated cybersecurity tool used against some of the world's largest companies. Learn about the research and development process behind creating custom red team tools, gaining rare insights into professional penetration testing methodologies and real-world attack scenarios. Explore how this C2 framework became a cornerstone of TrustedSec's toolkit over three years of challenging engagements, with practical demonstrations of its capabilities and applications. Understand the technical details of how small system modifications can lead to significant security implications, while gaining valuable perspective on the tools and techniques employed by professional red teams in enterprise environments.
Syllabus
4. Oddvar Moe: Redteam Chronicles: A C2 Story - Outlook's One-Setting Wonder
Taught by
x33fcon