The Golden Age of C2

Posted on in Presentations

Defenders are becoming overly reliant on their tools. What happens when the adversary targets the defender’s own infrastructure? Worse, what happens when the attacker weaponizes it against them? A focus on the defense allows the red teamer to control everything, even what happens after discovery. This session will ask and examine the implications of, "Does the defender know the adversary is there?"

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Attendees should have knowledge of networking concepts and offensive operations such as penetration testing or red teaming. This session is very hands-on but does include guided walkthroughs for the exercises. Basic knowledge of scripting and post-exploitation activities such as tunneling and lateral movement will also enhance the learning experience.


This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.


Matthew Toussain

CTO, Open Security / Course Author, Instructor SANS Institute, Open Security / SANS Institute

Hackers & Threats Technology Infrastructure & Operations

critical infrastructure cyber warfare & cyber weapons network security penetration testing deception-based security



Share With Your Community