Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging
This research paper examines the effectiveness of a sample of open-source Commandand-Control (C2) frameworks in evading advanced audit logging during postexploitation. Zero-day exploits, such as OMIGod (CVE-2021-38647), provide initial access; attackers' follow-on actions, including enumeration,...