Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

C2 comment steganography

Name: Anonymous 2018-09-21 22:07

Use comments on social media platforms for botnet command and control.

Convert commands or data exfiltration to base64, then encrypt, then turn into sentences.

If you have a piece of base64 data that's like TM0CwM3iFxUVjmI, you could turn it into a text comment like this: Timothy Metal 0.345 Circle with Multiple 3,464 intelligent Foxtrot Ultra Valley jazz make Iridescent. Just turn the characters into words, just randomly picked from a dictionary file.

It looks like nonsense but it wouldn't be detected as base64, could get past spam filters, etc.

Name: Anonymous 2018-09-22 4:12

#withTimothy #Metal #Circle #Multiple #Ultraintelligent #Foxtrot #Valley #jazzmaker #Iridescent

Name: Internet Explorer 2018-09-22 12:19

Name: Anonymous 2018-09-23 2:25

interesting.

Don't change these.
Name: Email:
Entire Thread Thread List