ĢTV

Glitch effect

BYOC2: Bring Your Own Command and Control

We live in a security industry where the best mindset is to assume compromise. The hackers are already inside our network—but then what happens?
Glitch effectGlitch effect
Download Your
On-Demand Webinar
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Watch the
Webinar
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

We live in a security industry where the best mindset is to assume compromise. The hackers are already inside our network—but then what happens? In some cases, they might exfiltrate data or run post-exploitation with their C2 or “Command and Control” access.

In this session, we’ll explore artifacts from a real security incident where evidence of a hacker’s custom C2 framework was left behind. Watch as we pull back the curtain and highlight how this threat actor maintained their access and controlled their victims—and why understanding the offense can help you bolster your defense.

Glitch banner
Topics Covered
Attacker Tradecraft
Share
Generic Headshot Profile
John Hammond
Senior Security Researcher, ĢTV
Linkedin icon

BYOC2: Bring Your Own Command and Control

Glitch effectGlitch effectGlitch effect