Investigating C2 Traffic | Tryhackme ItsyBitsy Walkthrough

Опубликовано: 17 Март 2025
на канале: I.T Security Labs
606
20

In this video, I’ll utilize the ELK stack knowledge I obtained from the previous room to investigate a potential malware infection. By going through a mock incident and utilizing real-world data sources such as proxy logs, I will gain hands-on practice in core techniques like event correlation, pivoting to an IP address to find other systems that have communicated with it. Lets investigate an alert by IDS regarding a potential C2 communication, deploying a machine, and diving into the network connection logs to uncover the details of a suspicious file accessed by a user from the HR department.

This video is perfect for anyone looking to enhance their cybersecurity skills using the powerful ELK Stack. Room link: Itsybitysy : https://tryhackme.com/r/room/itsybitsy

Remember to like and subscribe for more