This diagram can help illustrate the tiers and the relationships of how to share information between each.
C2 Multi-tier DesignDesigning a C infrastructure is one of the most critical tasks when planning a Red Team engagement.
C2 infrastructure planning involves choosing the
number and type of C servers, whether to use IP
addresses or domain names,
the C protocols, and how or if to use redirectors. The decision of each is directly related to a Red Team’s goals. If a team is engaging a target in a full-scale Red Team operation, stealth and covert channels will be good choices.
Typical C Design fora Full-Scale Red Team Operation
●
Three C servers
with an Interactive tier, Short Haul server, and Long Haul server
●
Multiple redirectors
●
One or two carefully chosen domain names for each IP address (preferably with history and categorization)
●
Direct communication between the target and C does not occur. All traffic pivots
through a redirection server●
The use of common protocols on standard ports to blend (HTTP, HTTPS, SSH, DNS)
●
Communications are encrypted
If a team is emulating a specific threat or trying to stimulate a Blue Team’s response, stealth may not be as important.
Typical C Design for Emulating a Threat Designed to Stimulate Blue (Exercises)
One or two C servers. All tiers are used for
interaction with the target●
Redirectors are not in use
●
IP addresses are used instead of domain names
●
The target
and C directly communicate●
The use of common protocols on standard or nonstandard ports (HTTP, HTTPS)
●
Communications mayor may not be encrypted
Share with your friends: