C2 Forensics: Analyzing Metasploit traffic

(Note: for this example I used a Python server, thus is not commented in the findings)
Note: for this example I used a Python server, thus is not commented in the findings

--

--

--

Kimchi and Ransomware. Incident Responder and sort of malware analyst in my free time. Personal blog, opinions are my own.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Basics of OAuth 2.0

Cybercrimes and cybersecurity, challenges for companies and countries

Personal cybersecurity posture for when you’re just this guy, you know?

Cyber Recovery versus Disaster Recovery — What is the Difference?

Simple CTF -WriteUP [TryHackMe]

A Tale of Two Breaches

ProBit x Digital Bank of Africa Telegram AMA Session Win 500 DBA tokens (~$500 worth)!

Assets Staking: How Stafi protocol is Revolutionizing PoS

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sapphire

Sapphire

Kimchi and Ransomware. Incident Responder and sort of malware analyst in my free time. Personal blog, opinions are my own.

More from Medium

How to provide cybersecurity solutions and services on a large scale

Malware Attacks on IoT Devices

Cyberthreats and Protection of Power Grid

4 Ways to Stop Ransomware on the Endpoint