❌

Normal view

Bypassing Cylance: Part 2 – Using DNSCat2

By: BHIS
28 March 2017 at 16:22

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment.Β  The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 2 – Using DNSCat2 appeared first on Black Hills Information Security, Inc..

❌