Understand payload generation concepts, C2 beacon operations, evasion techniques, and their detection — offense meets defense. Every offensive technique is paired with its detection query.
Click any row to expand for detailed explanation, ATT&CK mappings, and full detection queries.
| Evasion Technique | How It Works | Detection Method | Effectiveness |
|---|
Scenario: A threat actor (synthetic APT group PHANTOM NEXUS) targets Acme Corp (example.com) for intellectual property theft. Click each phase to explore attacker actions and defender detection opportunities.
All data is synthetic. IPs are RFC 5737. Domains are *.example.com.