Daily Cyber Threat Brief cover image

đź”´ August 14's Top Cyber News NOW! - Ep 429

Daily Cyber Threat Brief

00:00

Socks by Protocol C Two

Socks performs at layer five of the OS same OSI model. Socks five provides authentication. So only authorized users may access the server. They're probably taking advantage of that in order to somewhat protect their C two infrastructure. The final thing I'll say is since they're using cobalt strike, you'd have to think cobalt strike would support that socks by protocol C two. You don't typically see C two traffic going across that.

Play episode from 44:39
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app