- We can use different platforms such as Gmail, Twitter, and different protocol suits like HTTP 2.0, DNS, and so for communication.
- It's recommended that you create a new account because sometimes Dropbox can disable your account as we're using their features in a simulated attack.
- Well you can but you need your system to be connected to the internet at all times because you never know when the agent will be connecting to you. It's recommended that you setup the C2 server on a cloud service like AWS for efficient usage.
- Yes there are tools which can be used for automated configuration and setup. Refer to https://rastamouse.me/2017/08/automated-red-team-infrastructure-deployment-with-terraform---part-1/.
- We can use Ansible to deploy and monitor our C2 servers. Refer to https://rastamouse.me/2017/08/automated-red-team-infrastructure...
United States
Great Britain
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Singapore
Hungary
Philippines
Mexico
Thailand
Ukraine
Luxembourg
Estonia
Lithuania
Norway
Chile
South Korea
Ecuador
Colombia
Taiwan
Switzerland
Indonesia
Cyprus
Denmark
Finland
Poland
Malta
Czechia
New Zealand
Austria
Turkey
Sweden
Italy
Egypt
Belgium
Portugal
Slovenia
Ireland
Romania
Greece
Argentina
Malaysia
South Africa
Netherlands
Bulgaria
Latvia
Japan
Slovakia