Infrastructure Design
When done properly an encrypted protocol such as HTTPS will be used for egress C2 traffic. Traffic is sent to a public cloud expendable redirector. The redirector an SSH or VPN tunnel to the C2 server.
The simulated adversary area should not have direct inbound access from the internet.
No data should be stored on the redirector ttraffic should only transit through it.
Last updated
Was this helpful?