Home / Companies / Crowdstrike / Blog / Post Details
Content Deep Dive

Walking Through Walls: Four Common Endpoint Tools Used to Facilitate Covert C2

Blog post from Crowdstrike

Post Details
Company
Date Published
Author
Falcon OverWatch Elite
Word Count
2,717
Language
English
Hacker News Points
-
Summary

CrowdStrike's blog discusses various developments and strategies in cybersecurity, emphasizing the importance of proactive threat hunting and advanced security measures. Key highlights include the introduction of Threat AI, the first agentic threat intelligence system, and innovations in identity security, data protection, and AI security services. The blog also details the use of tools like ngrok, ProxyChains, Plink, and HTRAN by adversaries to bypass network defenses and establish covert communications. CrowdStrike's Falcon OverWatch team actively monitors these threats, providing insights and recommendations to enhance security resilience. Additionally, the blog underscores CrowdStrike's leadership and recognition in the cybersecurity space through various accolades, such as being named a leader in the IDC MarketScape and Forrester Wave reports.