<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Command and Control (C2) &#8211; phishandchips.io</title>
	<atom:link href="https://phishandchips.io/category/framework/command-and-control-c2/feed/" rel="self" type="application/rss+xml" />
	<link>https://phishandchips.io</link>
	<description>Discussing cybersecurity one byte at a time.</description>
	<lastBuildDate>Tue, 26 Sep 2023 13:47:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://phishandchips.io/wp-content/uploads/2023/09/cropped-phishandchips.io_-32x32.png</url>
	<title>Command and Control (C2) &#8211; phishandchips.io</title>
	<link>https://phishandchips.io</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">223541256</site>	<item>
		<title>What is a Reverse TCP Shell?</title>
		<link>https://phishandchips.io/what-is-a-reverse-tcp-shell/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 26 Sep 2023 13:47:25 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<category><![CDATA[Framework]]></category>
		<category><![CDATA[Payload Delivery]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=938</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">938</post-id>	</item>
		<item>
		<title>Breaking the Chain: Disrupting C2 Infrastructure in Phishing</title>
		<link>https://phishandchips.io/breaking-the-chain-disrupting-c2-infrastructure-in-phishing/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 12:04:49 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<guid isPermaLink="false">https://phishandchips.io/breaking-the-chain-disrupting-c2-infrastructure-in-phishing/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">346</post-id>	</item>
		<item>
		<title>The Art of Clickbait: Tempting Targets with Phishing Links</title>
		<link>https://phishandchips.io/the-art-of-clickbait-tempting-targets-with-phishing-links/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 12:04:48 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<guid isPermaLink="false">https://phishandchips.io/the-art-of-clickbait-tempting-targets-with-phishing-links/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">340</post-id>	</item>
		<item>
		<title>Command and Control: How To Maintain Control</title>
		<link>https://phishandchips.io/command-and-control-how-to-maintain-control/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 12:04:48 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<guid isPermaLink="false">https://phishandchips.io/command-and-control-how-cybercriminals-maintain-control/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">342</post-id>	</item>
		<item>
		<title>Hidden Strings: The Role of C2 Servers in Phishing Attacks</title>
		<link>https://phishandchips.io/hidden-strings-the-role-of-c2-servers-in-phishing-attacks/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 12:04:48 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<guid isPermaLink="false">https://phishandchips.io/hidden-strings-the-role-of-c2-servers-in-phishing-attacks/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">343</post-id>	</item>
		<item>
		<title>Cloaked Connections: Understanding C2 Communications</title>
		<link>https://phishandchips.io/cloaked-connections-understanding-c2-communications/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 12:04:48 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<guid isPermaLink="false">https://phishandchips.io/cloaked-connections-understanding-c2-communications/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">344</post-id>	</item>
		<item>
		<title>Tracking the Invaders: Tracing Back to Command and Control</title>
		<link>https://phishandchips.io/tracking-the-invaders-tracing-back-to-command-and-control/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 12:04:48 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<guid isPermaLink="false">https://phishandchips.io/tracking-the-invaders-tracing-back-to-command-and-control/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">345</post-id>	</item>
	</channel>
</rss>
