- We can use different platforms such as Gmail, Twitter, and different protocol suits like HTTP 2.0, DNS, and so for communication.
- It's recommended that you create a new account because sometimes Dropbox can disable your account as we're using their features in a simulated attack.
- Well you can but you need your system to be connected to the internet at all times because you never know when the agent will be connecting to you. It's recommended that you setup the C2 server on a cloud service like AWS for efficient usage.
- Yes there are tools which can be used for automated configuration and setup. Refer to https://rastamouse.me/2017/08/automated-red-team-infrastructure-deployment-with-terraform---part-1/.
- We can use Ansible to deploy and monitor our C2 servers. Refer to https://rastamouse.me/2017/08/automated-red-team-infrastructure...
United States
United Kingdom
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Argentina
Austria
Belgium
Bulgaria
Chile
Colombia
Cyprus
Czechia
Denmark
Ecuador
Egypt
Estonia
Finland
Greece
Hungary
Indonesia
Ireland
Italy
Japan
Latvia
Lithuania
Luxembourg
Malaysia
Malta
Mexico
Netherlands
New Zealand
Norway
Philippines
Poland
Portugal
Romania
Singapore
Slovakia
Slovenia
South Africa
South Korea
Sweden
Switzerland
Taiwan
Thailand
Turkey
Ukraine