SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis research paper examines the effectiveness of a sample of open-source Commandand-Control (C2) frameworks in evading advanced audit logging during postexploitation. Zero-day exploits, such as OMIGod (CVE-2021-38647), provide initial access; attackers' follow-on actions, including enumeration, persistence, and data exfiltration, offer ideal detection opportunities through tools like auditd with custom rulesets.


















