• Hi ! If you like TechTobo Forums then please Disable Adblocker to whitelist our domain (www.techtobo.com) | Moreover, if you are happy with us then contribute by using the Donate Button

Command and Control with Merlin By Zach Roof

  • Thread starter Pasu
  • Start date
  • Replies : 0
  • Views : 472


Junior Member
Jan 12, 2020
In this course, you will learn Command And Control using Merlin. Merlin’s “magic” is in the usage of modules (for attack automation), HTTP/3 (for evading packet inspection), and Golang (for cross-compiling agents on multiple Operating Systems).


Want to learn how a C2 server can be leveraged to steal a database backup? If so, you’re in the right place! In this course, Command and Control with Merlin, we’ll cover how to utilize Merlin to execute data exfiltration in a red team environment. First, you’ll witness how Merlin evades network packet detection via the HTTP/3 protocol. Second, you’ll use Merlin’s HTTP/3 functionality to upload a recon script. Finally, you’ll use the results of the recon script to exfiltrate a database backup to the Merlin C2 server. During each step of the process, we’ll see what Merlin attacks are discovered by Wazuh (a host-based intrusion detection system) and Suricata (a network-based intrusion detection system). No previous Wazuh or Suricata experience is required. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques: Exfiltration Over C2 Channel (T1041), Ingress Tool Transfer (T1105), Application Layer Protocol (T1071) using Merlin.

Course info​

Level Intermediate
Updated Dec 21, 2020
Duration 27m

Download PluralSight Command And Control With Merlin Bookware PluralSight Command And Control With Merlin Bookware.png

Last edited:
  • Like
Reactions: GOOO

Forum statistics

Latest member