New Skill Unlocked: C2 Infrastructure Automation

In this hands-on session, we'll demystify the process of deploying and configuring C2 components, such as frameworks, redirectors, and associated compute infrastructure.

You'll learn how to leverage infrastructure as code principles to create consistent, reliable, and secure C2 deployments, all while minimizing the risk of human error.

Link to slides presented

Session goals

  • Understand the components of a C2 infrastructure and how they work together
  • Learn how to deploy, configure, and secure C2 components using automation
  • Discover how to design and implement infrastructure as code for consistent and reliable deployments
  • Implement operational security for C2 infrastructure
  • Design scalable and easy-to-understand C2 deployment patterns

Session overview

  • Overview of components being deployed
  • Architecture diagram
  • Operationally secure configuration
    • Restricted ingress traffic
    • SSH/RSA key restriction
    • Redirection through VPN interface
    • C2 server has all ingress access restricted after configuring
  • Scalability
    • Use of count attribute in Terraform allowing us to deploy multiple EC2 instances of each resource compatible with this method

Requirements