External Requests

This section deals with the Comman and Control Center (C2) needed to be established to simulate threat actors C2 and simulate external inputs and facilitate data exfiltration.


Types

  1. Firewalled Requests:
    • These are the requests to the C2 server and data exfiltration points.
    • The connections are limited to only the servers and cut off from any other network
  2. Sandboxed:
    • These are the attacks dealing with the malware and other dangerous payloads.
    • Care to be taken to prevent leakage and external damage.

NOTE

More Inputs needed and stressed on containing the attacks.





alt text                                         alt text                                     alt text