Red Team Infrastructure

Proposed Scalable Infrastructure for Operational Resiliency

Default

EDRs will attempt a hostile scanning of IP addresses found from any files or implants dropped to disk like the following:

The infrastructure design uses mod_rewrite to redirect non-beacon traffic (controlled by the Malleable Profile) to a legitimate looking website. The idea is to allow quick tear down and spin up of redirectors in the case of IP blacklisting.

C2 Infrastructure with Redirectors

Extreme Egress Filtering

On a network with strict egress filtering policy, it may be easy to gain code execution/run a beacon implant, but difficult to egress out of it. In most real world engagements, this is implemented by forcing allowed outbound connections to go through a proxy locked behind system settings.

As a HTTP/HTTPS beacon uses the POST method to send output back to the Team Server, this means that while a beacon can check-in frequently and execute tasks successfully, the operator will receive no output back on the CobaltStrike client.

By adding Domain Fronting capabilities, we can abuse CDNs to mask all the POST methods sent by the agent.

Integrating Domain Fronting

Last updated