Archive: https://archive.today/jCIwC
From the post:
>I’ve been using MeetC2 in my RedTeam campaigns for months now, and with the amazing feedback from the community, I planned to public a new toolkit (XRayC2). I always like to work on initial access evading traditional network defenses. In this we used AWS X-Ray Amazon’s distributed application tracing service into a covert communication channel. This technique leverages legitimate cloud monitoring infrastructure to establish bidirectional C2 communication.
Archive: https://archive.today/jCIwC
From the post:
>>I’ve been using MeetC2 in my RedTeam campaigns for months now, and with the amazing feedback from the community, I planned to public a new toolkit (XRayC2).
I always like to work on initial access evading traditional network defenses. In this we used AWS X-Ray Amazon’s distributed application tracing service into a covert communication channel. This technique leverages legitimate cloud monitoring infrastructure to establish bidirectional C2 communication.
(post is archived)