Infrastructure Diagram & Requirements

- Rule of segmentation

  1. Set of servers for phishing operations

  2. Set of servers to initiate comunications with the target servers, browsing their websites and lookng for vulnerabilities.

  3. Set of servers for reverse shells, or programs that we execute on the victim's servers or laptops that phone back home to give us full control. (C2)

  4. Set of servers to serve payloads

  5. Set of servers for redirection purpuses, to hide operational servers

Last updated