- Becoming the Hacker
- Adrian Pruteanu
- 349字
- 2021-06-11 13:38:52
Cloud infrastructure
When conducting assessments, it is common for an attacker to leverage command and control (C2) servers during a campaign. The purpose of most C2 servers is to issue commands to malware running inside the compromised environment.
Attackers can instruct malware to exfiltrate data, start a keylogger, execute arbitrary commands or shellcode, and much more. In later chapters, we will primarily use the cloud C2 server to exfiltrate data and to discover vulnerabilities out-of-band.
A C2 server, being accessible from anywhere, is versatile in any engagement. The cloud is the perfect location to host C2 infrastructure. It allows quick and programmable deployments that can be accessed from anywhere in the world. Some cloud providers will even support HTTPS, allowing for the quick spin up of a C2 without having to worry about purchasing and managing domains or certificates.
The popular choice for penetration testers is Amazon Web Services (AWS), a leader in the cloud space. Its services are fairly inexpensive and it offers an introductory free tier option.
Other viable cloud providers include the following:
- Microsoft Azure: https://portal.azure.com
- Google Cloud Platform: https://cloud.google.com
- DigitalOcean: https://www.digitalocean.com
- Linode: https://www.linode.com
Microsoft's Azure has a software as a service (SaaS) free tier feature that lets you deploy C2 automatically from a GitHub repository. It also provides HTTPS support out of the box, making it easier to hide C2 data from prying eyes and enabling it to blend in with normal user traffic.
Note
Always get permission (in writing!) from the cloud provider before conducting assessments using its infrastructure, even if it's something as simple as hosting a malicious JavaScript file on a temporary virtual machine.
Cloud internet service providers (ISPs) should have a form available for you to fill out that will detail an upcoming penetration test on their infrastructure. A testing window and contact information will likely need to be provided.
Whether we are using the cloud to house a C2 for an engagement or attacking applications hosted in the cloud, we should always notify the client of penetration testing - related activity.

Figure 1.7: A typical penetration test notification form
- unidbg逆向工程:原理與實踐
- 深入淺出隱私計算:技術(shù)解析與應(yīng)用實踐
- CTF競賽權(quán)威指南(Pwn篇)
- 隱私計算
- 從實踐中學(xué)習Kali Linux滲透測試
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實踐
- 華為防火墻實戰(zhàn)指南
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)實戰(zhàn)
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實戰(zhàn)
- 黑客攻防從入門到精通
- Kali Linux高級滲透測試(原書第4版)
- 信息系統(tǒng)安全等級化保護原理與實踐
- 數(shù)字銀行安全體系構(gòu)建
- 動態(tài)賦能網(wǎng)絡(luò)空間防御
- 黑客攻防從入門到精通:絕招版(第2版)