09-06-25, 05:50 PM
Hey all,
I’ve been working on refining some C2 infrastructure setups and testing stealth techniques in a controlled lab environment, trying to stay close to what’s being seen in recent real-world campaigns. Thought I’d open up the conversation and learn what others are experimenting with. Here’s what I’ve been playing with lately:
C2 Frameworks I'm using:
Transport & Evasion:
Initial Delivery Vectors:
Looking to exchange thoughts
Let’s trade knowledge
I’ve been working on refining some C2 infrastructure setups and testing stealth techniques in a controlled lab environment, trying to stay close to what’s being seen in recent real-world campaigns. Thought I’d open up the conversation and learn what others are experimenting with. Here’s what I’ve been playing with lately:
C2 Frameworks I'm using:
- Sliver (mTLS + DNS channels)
- Mythic with Apfell and Apollo payloads
- Custom C2 in Go with AES-CBC over HTTP
Transport & Evasion:
- Domain fronting
- JA3 evasion + randomized jitter
- DoH callbacks for quiet beacons
- Nginx redirectors with GeoIP filtering
Initial Delivery Vectors:
- LNK chains → DLL sideloading
- Signed MSI installers with hidden beacons
- COM hijacks + wscript = solid post-ex persistence in lab setup
Looking to exchange thoughts
- What’s your go-to transport method for C2 when dealing with modern EDR?
- Anyone experimenting with encrypted DNS tunneling for callbacks?
- Tools or scripts to automate redirector rotation or domain switching?
Let’s trade knowledge