C2 Matrix
C2 Matrix
C2 Matrix
C2 Matrix
The C2 Matrix
SANS Slingshot C2 Matrix Edition
Contribute
Lab Infrastructure
C2 Matrix Eval Lab
Basic Lab
Virtual Machines with C2s
Docker
Resources
C2
Caldera
Covenant
Empire
Faction
ibombshell
Koadic
Merlin
Mythic
Nuages
PoshC2
PowerHub
SilentTrinity
Sliver
SCYTHE
TrevorC2
Attack Infrastructure
Resources
Redirectors
Detection
Basics
Beacons
JA3/JA3S Hashes
JARM
Powered by GitBook

Redirectors

A lot has been written about redirectors. Here are a few references:

Redirect rules: https://github.com/0xZDH/redirect.rules​

Hosting and hiding your C2 with Docker and Socat: https://khast3x.club/posts/2020-02-09-C2-Protection-Socat-Docker/​

Introduction to Modern Routing For Red Team Infrastructure - using Traefik, Matasploit, Covenant, and Docker: https://khast3x.club/posts/2020-02-14-Intro-Modern-Routing-Traefik-Metasploit-Docker/​

AWS Lambda Redirector: https://blog.xpnsec.com/aws-lambda-redirector/​

Hiding in the Cloud: Cobalt Strike Beacon C2 using Amazon APIs: https://rhinosecuritylabs.com/aws/hiding-cloudcobalt-strike-beacon-c2-using-amazon-apis/​

Attack Infrastructure - Previous
Resources
Next - Detection
Basics
Last updated 11 months ago