Dec. 31, 2023, 8:16 p.m. | /u/Ravager6969

cybersecurity www.reddit.com

New to blue team stuff and just wanted to confirm i got a reason understanding of what commands look like from event log view.

Say a attacker installed a c2 beacon and then was able to install a service on another endpoint adjacent to it say using a service.

I suspect in general you not see any real commands on the initial compromised endpoint as its probibly encrypted or tunneled or something.

But on the endpoint the eventual command emerges …

attacker beacon blue blue team confirm cybersecurity endpoint event events install log query service team understanding

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

COMM Penetration Tester (PenTest-2), Chantilly, VA OS&CI Job #368

@ Allen Integrated Solutions | Chantilly, Virginia, United States

Consultant Sécurité SI H/F Gouvernance - Risques - Conformité

@ Hifield | Sèvres, France

Infrastructure Consultant

@ Telefonica Tech | Belfast, United Kingdom