External Requests
This section deals with the Comman and Control Center (C2) needed to be established to simulate threat actors C2 and simulate external inputs and facilitate data exfiltration.
Types
- Firewalled Requests:
- These are the requests to the C2 server and data exfiltration points.
- The connections are limited to only the servers and cut off from any other network
- Sandboxed:
- These are the attacks dealing with the malware and other dangerous payloads.
- Care to be taken to prevent leakage and external damage.
NOTE
More Inputs needed and stressed on containing the attacks.