In this chapter, we have provided an introduction to command and control (C2) servers and discussed how they are used in a red team operation. We have then covered how we can use cloud-based file-sharing services as C2s to make the communication between the target and our C2 stealthier. We have also learned about C2 covert channels and their importance with some commonly used protocols used in covert channels. In the next chapter, we will cover the topic of hiding C2s behind a Redirector so that even if the blue team detects the connection, only our redirector will be burned and not our C2.