Command and Control Frameworks in a Nutshellby@jeferson
2,145 reads

Command and Control Frameworks in a Nutshell

August 20th 2022
3 min
by @jeferson 2,145 reads
tldt arrow
Read on Terminal Reader🖨️

Too Long; Didn't Read

Command and Control (C2) frameworks are essential in the Red Teamers and Attackers playbooks. They help hackers of all types to take over networks or turn regular computers into bots, creating a network of remotely controlled computers that can send spam or launch DDoS attacks. There are numerous ways of infecting a computer and starting a C2 framework, and they are usually done through well-known ways. After the infection is done, the attacker can launch a reverse shell in order to execute commands, start a ransomware attack, exfiltrate data, launch a DDoS attack or just sit there.
featured image - Command and Control Frameworks in a Nutshell
Jeferson Borba HackerNoon profile picture

@jeferson

Jeferson Borba

About @jeferson
LEARN MORE ABOUT @JEFERSON'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa