Infrastructure Diagram & Requirements
Last updated
Last updated
Set of servers for phishing operations
Set of servers to initiate comunications with the target servers, browsing their websites and lookng for vulnerabilities.
Set of servers for reverse shells, or programs that we execute on the victim's servers or laptops that phone back home to give us full control. (C2)
Set of servers to serve payloads
Set of servers for redirection purpuses, to hide operational servers