If you want to detect post exploitation and have only firewall/proxy logs, you can use RITA-J for C2 beaconing detβ¦ twitter.com/i/web/status/1β¦
15 Dec 21copy & paste+upvote-downvoteπ‘If you want to detect post exploitation and have only firewall/proxy logs, you can use RITA-J for C2 beaconing detβ¦ https://t.co/JAiOjzVqrX
β@_lexiemichelee: @MariaCabayubi you know how slow I am Maria. But it looks really goodβhah I know this. But thank youuu
14 Jan 13copy & paste+upvote-downvoteβ@_lexiemichelee: @MariaCabayubi you know how slow I am Maria. But it looks really goodππππβhah I know this. But thank youuu βΊπππ