Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced techniques for simulating malware protocols in distributed networks during this HITB2021SIN conference talk. Delve into the challenges of identifying malicious activities in large networks and the complexities of conducting realistic simulations without using actual malware. Learn about Tehsat, an open-source defensive tool developed to facilitate safe and easy C2 simulations across various protocols. Discover how to create custom profiles, design simulations, and utilize C2 command mocking through agents. Gain insights into analyzing cyber data analytics infrastructure efficiency, planting flags for incident response teams, and conducting safe purple team exercises. Understand the differences between various C2 channels and their real-world implementations, and explore ways to simulate long-term threat actor presence and build resilience against these activities.