Glitch effect

BYOC2: Bring Your Own Command and Control

We live in a security industry where the best mindset is to assume compromise. The hackers are already inside our network—but then what happens?

Download Your

On-Demand Webinar

Watch the Webinar

By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download Your

On-Demand Webinar

Watch the Webinar

down arrow
down arrow
By submitting this form, you accept our Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effectGlitch effect

We live in a security industry where the best mindset is to assume compromise. The hackers are already inside our network—but then what happens? In some cases, they might exfiltrate data or run post-exploitation with their C2 or “Command and Control” access.

In this session, we’ll explore artifacts from a real security incident where evidence of a hacker’s custom C2 framework was left behind. Watch as we pull back the curtain and highlight how this threat actor maintained their access and controlled their victims—and why understanding the offense can help you bolster your defense.

Generic Headshot Profile
John Hammond
Senior Security Researcher, Huntress
Linkedin icon

BYOC2: Bring Your Own Command and Control

Glitch effectGlitch effectGlitch effect