Infrastructure
Overview
Red team infrastructure is the backend that supports C2 communications, payload delivery, and phishing. A well-designed infrastructure uses redirectors, aged domains, valid certificates, and covert channels to resist takedown and avoid detection. Infrastructure should be disposable — assume it will be burned and plan for teardown and rebuilding.
Topics in This Section
General Approach
- Plan infrastructure — C2 servers, redirectors, domains, certificates
- Acquire and age domains — register 2+ weeks before the engagement
- Deploy redirectors — never expose team servers directly
- Configure C2 profiles — customize traffic to blend with legitimate patterns
- Test end-to-end — verify callbacks through the full redirect chain