Logo
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

#Security Testing#Offensive Security

A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.

Visit Website

Imagine you are conducting a Red Team engagement

Imagine you are conducting a Red Team engagement and want to minimize the chances of being detected. You can do this by using a redirector host to filter Command and Control (C2) traffic to your Cobalt Strike server, while redirecting all other traffic to a harmless website. One effective method to accomplish this is by setting up an Apache redirector as an intermediary server. This setup allows your C2 domain to direct traffic through the redirector for filtering purposes.

This setup provides the advantage of flexibility in security measures

This setup provides the benefit of allowing you to change the redirector's IP address and domain name if your main server is compromised.