👩💻 Join our community of thousands of amazing developers!
Series Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 1) Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2) (this one) Overview Following my last post about some evasion techniques that the Symbiote uses which I tried to recreate in their simplest form, this post will see how the Symbiote is communicating to the command and control C2 server. Upon reading the article, we can see that the Symbiote uses the DNS Protocol to exfiltrate data out of the inf...