Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite Logo

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

0
Free
Visit Website

Imagine you are performing a Red Team engagement and want to reduce the risk of being caught by using a redirector host to filter C2 traffic to your Cobalt Strike server and redirect all other traffic to an innocuous website. One way to achieve this is by setting up an Apache redirector as an intermediary server, allowing your C2 domain to point at it for traffic filtering. This setup provides the benefit of being able to change the redirector's IP and domain if your main server is compromised.

FEATURES

ALTERNATIVES

A practical guide on NTLM relaying for Active Directory attacks.

CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.

An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.

A script to enumerate Google Storage buckets and determine access and privilege escalation

A guide to bypassing RFID card reader security mechanisms using specialized hardware

Find RCE gadgets for CTF pwn challenges with ease.

A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.

A specification/framework for extending default C2 communication channels in Cobalt Strike

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved