
đź”´ August 14's Top Cyber News NOW! - Ep 429
Daily Cyber Threat Brief
00:00
Socks by Protocol C Two
Socks performs at layer five of the OS same OSI model. Socks five provides authentication. So only authorized users may access the server. They're probably taking advantage of that in order to somewhat protect their C two infrastructure. The final thing I'll say is since they're using cobalt strike, you'd have to think cobalt strike would support that socks by protocol C two. You don't typically see C two traffic going across that.
Play episode from 44:39
Transcript


