Skip to content
bughra.dev
Go back

Command and Control (C2) Frameworks

Introduction

Command and Control (C2) frameworks are software platforms used during red team operations and penetration testing to maintain communication with compromised systems and control deployed payloads. They provide infrastructure for post-exploitation activities including lateral movement, persistence, and data exfiltration.

C2 Server Components

Command and Control Servers

C2 servers are the central management systems that control compromised hosts within a target network.

Agents/Payloads

Agents (also called implants or payloads) are the malicious code deployed on target systems that establish communication with the C2 server.

Listeners

Listeners are server components that await incoming connections from agents.

Beacons

Beacons are a type of agent that connect back to the C2 server at configurable intervals.

Payload Delivery and Communication

Payload Types

Different types of payloads designed for specific environments or requirements.

Payload Formats

Different output formats for payloads to suit various delivery methods.

Evasion and Resilience Techniques

Domain Fronting

Domain fronting is a technique that disguises C2 traffic as traffic to popular high-reputation domains.

Redirectors

Intermediate servers that forward traffic between agents and C2 servers.

C2 Communications Profiles

Communications profiles define how C2 traffic appears on the network.

Operational Considerations

Infrastructure Setup

Detection Evasion

Common Tools and Features

FrameworkLanguageLicenseKey Features
Cobalt StrikeJavaCommercialMalleable C2, team server, extensive evasion
EmpirePowerShell/PythonOpen SourcePowerShell-based, modular architecture
Covenant.NETOpen SourceWeb interface, .NET payloads, task-based model
MetasploitRubyOpen SourceExtensive exploit library, meterpreter
SliverGoOpen SourceCross-platform, multi-player, implant customization
MythicPython/JavaScriptOpen SourceModular design, container-based, multi-C2
HavocC/C++Open SourceModern evasion, Demon agent, extensible
MerlinGoOpen SourceHTTP/2 C2 communications

Share this post on:

Previous Post
Windows Privilege Escalation
Next Post
Active Directory Breaching Techniques