TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

How to Build a C2 Infrastructure with Digital Ocean – Part 1

BHIS · 2017-07-24 · Read original ↗

ATT&CK techniques detected

8 predictions
T1071.001Web Protocols
80%
“/ blue teams - functionality - add / remove / modify features and capabilities as the team requires the red team infrastructure wiki is a great example and resource of this exact concept. you can read more at https : / / github. com / bluscreenofjeff / red - team - infrastructure…”
T1572Protocol Tunneling
73%
“and tcp for dns beacons and evil dns things you may need - cobalt strike team server port ( 50050 ) - our custom ssh port ( 7654 ) save the rules and then apply them to your droplets. you can either select droplets by name or by tag and add the firewall rules to all of them. very…”
T1071.001Web Protocols
73%
“is you can automatically receive emails and connect the alerts into a slack channel. any new performance alerts will be sent your specified slack channel. conclusion this script is in its early phase and i hope to develop a framework with some killer automation features. for now,…”
T1583.001Domains
72%
“how to build a c2 infrastructure with digital ocean – part 1 how to build a c2 infrastructure with digital ocean – part 1 lee kagan * / / advisory : the techniques and tools referenced within this blog post may be outdated and do not apply to current situations. however, there is…”
T1588.002Tool
69%
“for redblack security ’ s rogue team specializing in threat and adversary emulation in toronto, canada. lee ’ s focus on the team and in practice is offensive infrastructure support, post - exploitation of windows and active directory environments, powershell and c # weaponizatio…”
T1572Protocol Tunneling
57%
“cnc3 ”. going forward i will be demonstrating the rest of our deployment on “ cnc1 ” for the sake of time but the process will be identical to the others. the droplets should take a short moment to be created. once they are live, ssh in using the root account and the ssh key you …”
T1071Application Layer Protocol
35%
“will then copy over the custom sshd configuration file it ships with but this is entirely optional to your preferences. simply comment this out if you do not wish for this to happen. the firewall rules i demonstrated in the control panel will be set and saved across reboots then …”
T1572Protocol Tunneling
34%
“invokethreatguy / c2k - dns configuration access for your domain ( s ) - will need to set dns a records the infrastructure we are going to set up will do the following ( mostly scripted ) : - deploy our droplets via digital ocean web ui - ssh into each and add new sudo user, add …”

Summary

Lee Kagan* // Deploying an offensive infrastructure for red teams and penetration tests can be repetitive and complicated. One of my roles on our team is to build-out and maintain […]

The post How to Build a C2 Infrastructure with Digital Ocean – Part 1 appeared first on Black Hills Information Security, Inc..