Command and Control Frameworks in a Nutshellby@jeferson
3,900 reads

Command and Control Frameworks in a Nutshell

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Command and Control (C2) frameworks are essential in the Red Teamers and Attackers playbooks. They help hackers of all types to take over networks or turn regular computers into bots, creating a network of remotely controlled computers that can send spam or launch DDoS attacks. There are numerous ways of infecting a computer and starting a C2 framework, and they are usually done through well-known ways. After the infection is done, the attacker can launch a reverse shell in order to execute commands, start a ransomware attack, exfiltrate data, launch a DDoS attack or just sit there.
featured image - Command and Control Frameworks in a Nutshell
Jeferson Borba HackerNoon profile picture


Jeferson Borba

Hackernoon dev, Elixir enthusiast, and video games collector

Receive Stories from @jeferson

react to story with heart

Test your Knowledge

What is the most popular C&C Framework?

Who was the creator of the Cobalt Strike Framework?

it’s an application that runs on the C2 servers and waits for a callback on a specific port or protocol.


. . . comments & more!