In this hands-on session, we'll demystify the process of deploying and configuring C2 components, such as frameworks, redirectors, and associated compute infrastructure.
You'll learn how to leverage infrastructure as code principles to create consistent, reliable, and secure C2 deployments, all while minimizing the risk of human error.
- Understand the components of a C2 infrastructure and how they work together
- Learn how to deploy, configure, and secure C2 components using automation
- Discover how to design and implement infrastructure as code for consistent and reliable deployments
- Implement operational security for C2 infrastructure
- Design scalable and easy-to-understand C2 deployment patterns
- Overview of components being deployed
- Architecture diagram
- Operationally secure configuration
- Restricted ingress traffic
- SSH/RSA key restriction
- Redirection through VPN interface
- C2 server has all ingress access restricted after configuring
- Scalability
- Use of
count
attribute in Terraform allowing us to deploy multiple EC2 instances of each resource compatible with this method
- Use of
- Windows virtual machine if you're using a macOS or Linux host. Download a Windows virtual machine
- Terraform installed on your system. See this documentation page for instructions
- AWS Access Keys generated. See this documentation page for instructions
- AWS Access Keys configured. See this documentation page for instructions
- Tailscale Auth Key to use in
tailscale
Ansible role. See this documentation page for instructions