Serverless C2 Redirectors: Lambda Functions and Infrastructure as Code
Build a serverless C2 redirector using AWS Lambda and API Gateway, deployed with Terraform. No persistent server, no attack surface, teardown in one command.
Read MoreBuild a serverless C2 redirector using AWS Lambda and API Gateway, deployed with Terraform. No persistent server, no attack surface, teardown in one command.
Read MoreThree techniques that exploit implicit trust in cloud providers: domain fronting, cloud service tunneling, and dead drops. Each strips away one more thing defenders can grab onto.
Read MoreA deep dive into layered red team C2 infrastructure design, covering how CDNs, redirectors, and trust boundaries work together to protect your C2 server from defender discovery.
Read MoreMicrosoft's Azure Relay Bridge (azbridge) creates encrypted tunnels between on-premises resources and Azure. Learn how red teamers can leverage this legitimate service for covert communications.
Read MoreThis article is part three and the final installment of our InfluenceOps series on tactical pretexting for social engineering engagements.
Read MoreSplunk's Boss of the SOC is essentially a CTF-style challenge for blue teamers. Walk through the ransomware scenario and learn how to hunt threats using Splunk.
Read MorePart two of our series on tactical pretexting continues with advanced techniques for building convincing personas and executing social engineering campaigns.
Read MoreAn introduction to tactical pretexting for red team operations. Learn the fundamentals of crafting believable pretexts and executing social engineering engagements.
Read More