Skip to main content
Meet NetWitness at RSA Conference 2024!
Stop by our booth #254 or book a meeting with an expert. Reserve Your Spot Today!
Securing the Digital World

From Webshell to C2: The Evolution of Post-Exploitation and Covert Operations

  • by Mohamed Osama, Mortada AboSteit, Abdelrahman Bakry, Senior Consultants and Analyst, Incident Response, NetWitness

Discover how cyber adversaries evolve their tactics and explore the intricate techniques attackers use to escalate privileges, establish persistence, and maintain stealthy command-and-control (C2) channels. From webshells to sophisticated post-exploitation frameworks, gain insights into the latest threat actor strategies and how defenders can stay ahead. Whether you’re a cybersecurity professional or an enthusiast, this deep dive into modern cyber threats is a must-read.

For more information, please check out the blog on our community page.

 

Figure 1: Attack Overview