• Presentation
    • Initial Setup & Installation
    • VM Installation & Verification
    • Attacking VM Setup
    • Victim VM Setup
    • Overview
    • Installation
    • Usage & CLI Commands
    • Configuration
    • Security Features
    • Deployment
    • Connection & Authentication
      • Connection
      • Password Protection
      • Command Execution
      • Crypto
      • Bonus Features
      • Fileless Dropper & Rootkit Loader
      • Stealth Hooks & daniel.* Commands
      • Encrypted C2, Persistence & Auth
      • Symbol Resolution & Ftrace Hooks
      • Remote Exec & File Transfer
    • Command Execution
    • Configuration Justifications
    • Security Interaction with C2
    • Handout Format
  • code Resources
  • savings Tux Fan Club: Chasse au Trésor Pirate
  • favorite Un dernier mot
    • GitHub
  • to navigate
  • to select
  • to close
    • Home
    • Attacking Program (C2 Server)
    On this page
    article

    Attacking Program (C2 Server)

    The C2 server for EpiRootkit. This section details its overview, installation, usage, configuration, and security aspects.

    article

    Overview

    A detailed overview of the Attacking Program (C2 Server), its purpose, and key functionalities.

    article

    Installation

    Essential setup for the C2 server.

    article

    Usage & CLI Commands

    Running the C2 server and its CLI.

    article

    Configuration

    Key C2 server configuration settings.

    article

    Security Features

    Overview of C2 server security: AES-GCM and SHA512.


    © 2025 Tux Fan Club. Built with Lotus Docs