NECCDC Red Team: Quick Twitter Command and Control (C2) Trojan
In the last few posts I covered a few C2 Trojans (DNS C2 Trojan, HTTP GET and POST Trojan). In this post I wanted to cover a method that uses Twitter for command and control.
In the last few posts I covered a few C2 Trojans (DNS C2 Trojan, HTTP GET and POST Trojan). In this post I wanted to cover a method that uses Twitter for command and control.
Catch our latest exploits, news, articles, and events.
Privacy Policy | Responsible Disclosure Policy | Terms of Service | Terms and Conditions
Copyright © 2024. All Rights Reserved.