Threat Hunting & Detection Handbook
CtrlK
  • About
  • Threat Hunting and Detection
    • Initial Access
    • Execution
    • Persistence
    • Lateral Movement
    • Command and Control
      • Enterprise Scale C2 Beacon Detection with Unsupervised ML and KQL — Part 1
      • Enterprise Scale C2 Beacon Detection with Unsupervised ML and KQL — Part 2
      • Implementing RITA using KQL
Powered by GitBook
On this page

Was this helpful?

  1. Threat Hunting and Detection

Command and Control

Posts about Command and Control tactic.

Enterprise Scale C2 Beacon Detection with Unsupervised ML and KQL — Part 1Enterprise Scale C2 Beacon Detection with Unsupervised ML and KQL — Part 2Implementing RITA using KQL

PreviousLateral MovementNextEnterprise Scale C2 Beacon Detection with Unsupervised ML and KQL — Part 1

Last updated 4 years ago

Was this helpful?