با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده
How Hackers Host C2 Servers on Google Infrastructure (Google Sheets & Drive)
Manage episode 363496530 series 3474385
This story was originally published on HackerNoon at: https://hackernoon.com/how-hackers-host-c2-servers-on-google-infrastructure-google-sheets-and-drive.
A guide on how to use Google Workspace's Drive and Sheets (formerly G-Suite) to communicate and exfiltrate information natively Drive and Sheets.
Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. You can also check exclusive content about #gc2, #security, #cybersecurity, #edr, #endpoint-detection-response, #youtubers, #hacking, #hackernoon-top-story, #hackernoon-es, #hackernoon-hi, #hackernoon-zh, #hackernoon-vi, #hackernoon-fr, #hackernoon-pt, #hackernoon-ja, and more.
This story was written by: @grantcollins. Learn more about this writer by checking @grantcollins's about page, and for more stories, please visit hackernoon.com.
Reading through my weekly security news and stumbled on a Bleepingcomputer article about using Google Workspace's Drive and Sheets (formerly G-Suite) to communicate and exfiltrate information natively Drive and Sheets. I thought this was a clever project because: You do not have to set up any particular domains, servers as most C2 frameworks do. (And many defense tools maintain a dynamic list of malicious domains, IPs, etc). This doesn't use common C2 and red team frameworks, such as Cobalt Strike, SilverC2, or Brute Ratel. This program and traffic only interact with Google's domains (*.google.com) to make detection more difficult for tools.
301 قسمت
Manage episode 363496530 series 3474385
This story was originally published on HackerNoon at: https://hackernoon.com/how-hackers-host-c2-servers-on-google-infrastructure-google-sheets-and-drive.
A guide on how to use Google Workspace's Drive and Sheets (formerly G-Suite) to communicate and exfiltrate information natively Drive and Sheets.
Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. You can also check exclusive content about #gc2, #security, #cybersecurity, #edr, #endpoint-detection-response, #youtubers, #hacking, #hackernoon-top-story, #hackernoon-es, #hackernoon-hi, #hackernoon-zh, #hackernoon-vi, #hackernoon-fr, #hackernoon-pt, #hackernoon-ja, and more.
This story was written by: @grantcollins. Learn more about this writer by checking @grantcollins's about page, and for more stories, please visit hackernoon.com.
Reading through my weekly security news and stumbled on a Bleepingcomputer article about using Google Workspace's Drive and Sheets (formerly G-Suite) to communicate and exfiltrate information natively Drive and Sheets. I thought this was a clever project because: You do not have to set up any particular domains, servers as most C2 frameworks do. (And many defense tools maintain a dynamic list of malicious domains, IPs, etc). This doesn't use common C2 and red team frameworks, such as Cobalt Strike, SilverC2, or Brute Ratel. This program and traffic only interact with Google's domains (*.google.com) to make detection more difficult for tools.
301 قسمت
All episodes
×
1 Thermodynamic limits around M-dwarf stars: Improving antenna efficiency with an energetic ’funnel’ 2:33

1 Thermodynamic Limits on Oxygenic Photosynthesis Around M-dwarf Stars: Abstract and Introduction 22:31


1 Crypto Open Patent Alliance Finds Evidence of Tampering in Wright's Claim to be Bitcoin Founder 11:40








1 IARPA Seeks to Measure Foreign Malign Influence Ahead of US Elections, Excludes Domestic Population 5:56









1 How to Quickly Summarize YouTube Videos Using Gemini, ChatGPT, Claude, and Perplexity in 2024 3:38


به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.