script:x509_ext_c2

**This is an old revision of the document!** ----

A PCRE internal error occured. This might be caused by a faulty plugin

====== Detecting covert channels in X.509 Digital Certificates using the Trisul LUA API ====== I saw a couple of blogs about a new way to create a C2 (Command and Control) channel using X.509 Certificates. This technique is described in //Abusing X.509 Certificates for Covert Data Exchange// ((Dark Reading https://www.darkreading.com/attacks-breaches/abusing-x509-digital-certificates-for-covert-data-exchange/d/d-id/1330984?_mc=sm_dr&hootPostID=a10970e131beaf9b5a7ac86b0564b114)) and the original link on the //Fidelis Blog Whats missing is in front of us// ((https://www.fidelissecurity.com/threatgeek/2018/02/exposing-x509-vulnerabilities) and also on the //Network Miner blog Examining a X.509 Covert Channel// (( Network Miner blog post https://www.fidelissecurity.com/threatgeek/2018/02/exposing-x509-vulnerabilities ))

script/x509_ext_c2.1518110702.txt.gz · Last modified: 2018/02/08 17:25 by veera