September 2018
Intermediate to advanced
480 pages
9h 45m
English
In this chapter, we have introduced redirectors and why obfuscating C2s is required. We have also covered how we can obfuscate C2s in a secure manner so that we can protect our C2s from getting detected by the Blue team. In addition, we have learned about short-term and long-term C2s and redirectors. Next, the payload redirection type was covered. Here, we learned about dumb pipe redirection and smart redirection. At the end of the chapter, we saw how we obtained a domain which resembles http://packtpub.com and how this can be used to achieve further anonymity.