Contact Sales
Contact Sales

Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging

Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging (PDF, 1.03MB)Published: 20 Mar, 2026
Created by:
Benjamin Evans

This research paper examines the effectiveness of a sample of open-source Commandand-Control (C2) frameworks in evading advanced audit logging during postexploitation. Zero-day exploits, such as OMIGod (CVE-2021-38647), provide initial access; attackers' follow-on actions, including enumeration, persistence, and data exfiltration, offer ideal detection opportunities through tools like auditd with custom rulesets.