Threat Hunting C2 over HTTPS Connections Using the TLS Certificate
Introduction As we’ve explored in numerous articles and Malware of the Day posts, there is no shortage of communication protocols threat actors can utilize for C2 communication. And while there is ...