C2
Once our offensive machine is all set and the domains are reserved, let's take a look at one of our core infrastructure components: C2. This type of asset will host C2 solutions and will be responsible for serving and communicating with compromised assets sitting internally within the organization. Essentially, it will host our payload, and once it has been executed on an asset, a communications link will then be established with this server's backend or moved to another type of server.
We can split C2 assets into the following categories, which are based on their intent and roles:
- Phishing C2
- Short-term C2
- Long-term C2
Phishing C2
As its name suggests, this type of C2 can be used in the early stage of the execution phase to phish our target by hosting a fake authentication page or payload to download.
The intent of this server is to send the first stage of our attack. Then, once the payload is executed or the credentials are harvested,...