Command and Control with Merlin
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 27m | 65 MB
Instructor: Zach Roof
In this course, you will learn Command And Control using Merlin. Merlin's "magic" is in the usage of modules (for attack automation), HTTP/3 (for evading packet inspection), and Golang (for cross-compiling agents on multiple Operating Systems).
Want to learn how a C2 server can be leveraged to steal a database backup? If so, you're in the right place! In this course, Command and Control with Merlin, we'll cover how to utilize Merlin to execute data exfiltration in a red team environment. First, you'll witness how Merlin evades network packet detection via the HTTP/3 protocol. Second, you'll use Merlin's HTTP/3 functionality to upload a recon script. Finally, you'll use the results of the recon script to exfiltrate a database backup to the Merlin C2 server. During each step of the process, we'll see what Merlin attacks are discovered by Wazuh (a host-based intrusion detection system) and Suricata (a network-based intrusion detection system). No previous Wazuh or Suricata experience is required. When you're finished with this course, you'll have the skills and knowledge to execute these techniques: Exfiltration Over C2 Channel (T1041), Ingress Tool Transfer (T1105), Application Layer Protocol (T1071) using Merlin.
Code:
https://www.pluralsight.com/courses/command-control-merlin

Code:
Download (Uploadgig)
https://uploadgig.com/file/download/6565a7b597253D19/dx6uk.Command.and.Control.with.Merlin.rar
Download ( Rapidgator )
https://rapidgator.net/file/bdb4cfdb5bb51a99669474a81832312f/dx6uk.Command.and.Control.with.Merlin.rar.html
Download ( NitroFlare )
http://nitroflare.com/view/F2D643A01568076/dx6uk.Command.and.Control.with.Merlin.rar[/center]