DNS can be a valuable data source for identifying covert command-and-control (C2) activity. Attackers rely on it precisely because it's allowed out of nearly every network, including highly restricted environments.
This module is designed to help new threat hunters recognize patterns that suggest DNS is being used for malicious communication. We'll walk through several C2 techniques, show you what they look like in real data and help you build practical hunting strategies based on observable behaviors.
You don’t need deep knowledge or a background in malware analysis to get started—just an eye for anomalies and a willingness to dig.
/mo
Explore realistic pre-recorded attacks
Master full-featured defensive platforms
Browser-based challenges and modules
Extended attack videos
Grants access to Analyst content. You can cancel any time by returning to this page and following the cancellation steps.
/mo
Instant fully interactive labs
Hands-on prevention and detection
Master offensive techniques
Security engineering exercises
Highly realistic and dynamic scenarios
Access to all Analyst-level content
Grants access to all Defender content, Analyst content and interactive lab environments. You can cancel any time by returning to this page and following the cancellation steps.