• v7.0.8
    • v7.11.0 (latest)
    • v7.10.0
    • v7.9.0
    • v7.8.0
    • v7.7.0
    • v7.6.0
    • v7.5.0
    • v7.3.0
    • v7.2.0
    • v7.1.1
    • v7.1.0
    • v7.0.8
  • Services & Support
  • Devo.com
  • Contact
    • Contact Us
    • Request a Demo
    • Partner Inquiry
  • Log In
    • USA Devo
    • EU Devo
PREVIOUS
Phishing attack
NEXT
Alerting system status

Applications / Devo Security Operations / Use cases / Command & Control

Download as PDF

Command & Control

  • Overview
  • Video tutorial

When we talk about a command-and-control server (C&C) we talk about a computer that is being controlled by an attacker for a specific purpose, normally to send commands to other systems compromised by malware and receive valuable information from the target network. These computers act as command centers to lead the attack and collect the data illicitly acquired.

In the following video, we will simulate a command-and-control situation and we will try to uncover suspicious activity by using Devo Security Operations (SecOps).

Download as PDF

PREVIOUS
Phishing attack
NEXT
Alerting system status

Export

See what Devo can do for you. Request a demo!
Discover what's new (Release notes)
  • v7.0.8
    • v7.11.0 (latest)
    • v7.10.0
    • v7.9.0
    • v7.8.0
    • v7.7.0
    • v7.6.0
    • v7.5.0
    • v7.3.0
    • v7.2.0
    • v7.1.1
    • v7.1.0
    • v7.0.8
  • Services & Support
  • Devo.com
  • Contact
    • Contact Us
    • Request a Demo
    • Partner Inquiry
  • Log In
    • USA Devo
    • EU Devo
  • +1 888 6830910 (USA)
  • +34 900 838 880 (Spain)
Copyright © 2019 Legal Terms Privacy Policy Cookies Policy

Powered by Confluence and Scroll Viewport