Joshua St. Hilaire

Principal Security Researcher

Joshua St.Hilaire is currently a Principal SecurityResearcher at Vectra where he currently leads research on adversarial detection models. He has twenty years of experience in computer security focused on incident response, threat hunting and reverse-engineering.

All blog posts from this author

Security research

Command and Control (C2) Evasion Techniques

January 28, 2021
Read blog post
Security research

Command and Control (C2) Evasion Techniques, Part 2

April 26, 2021
Read blog post

Joshua St. Hilaire

Principal Security Researcher

Joshua St.Hilaire is currently a Principal SecurityResearcher at Vectra where he currently leads research on adversarial detection models. He has twenty years of experience in computer security focused on incident response, threat hunting and reverse-engineering.

Posts from

Joshua St. Hilaire

April 26, 2021
|
By
Joshua St. Hilaire
Command and Control (C2) Evasion Techniques, Part 2

Network and endpoint defense technologies will have to either rapidly update signatures or use other investigative ways to detect command and control (C2). Uncover how threat actors evade security tools to execute C2 techniques to learn about what you should look for.

Read More
January 28, 2021
|
By
Joshua St. Hilaire
Command and Control (C2) Evasion Techniques

Learn how Command and Control (C2) frameworks are continuing to evolve in order to evade detection. Here we will examine a method known as JA3 signature randomization.

Read More