Command & Control (C2) Server

C2s are used by attackers to maintain communications with compromised systems within a target network

  • It must be restricted to the Red Team Operators & Managers

  • Features :

    • Customization

    • Integration with latest tools / scripts

    • Running implants in-memory / Payload Generation

    • Operator based IAM Roles

C2 Pools & Selection

Various Open-Source / Commercial options available out there

  • Red Team selects C2’s based on these criteria :

    • Compatible with Victim Workstation / Servers (Mac, Win, Linux)

    • Operator Roles Assignment

    • Customization & Accessibility

    • Client requirements & policies

    • Extensibility & Integrability with InfoSec community lead research

Operator Roles

  • While performing ops, Red Team requires role assignment for operators

  • The operators will have a separate login ID to access the C2 Portal

  • Some C2s offer centralized team server & the operators connect via softwares to perform operations

  • This way multiple operators can access the C2 simultaneously

C2 Profile

  • We will be using Mythic because of the compatibility with Mac, Win & Linux

  • Open-Source & offers features comparable with commercial C2s

  • Have C2 Profiles & Customization Support

Mythic C2

  • We will be using Mythic because of the compatibility with Mac, Win & Linux

  • Open-Source & offers features comparable with commercial C2s

  • Have C2 Profiles & Customization Support

Last updated