Home Setting up an automated Red Team Infrastructure (REDCELL)
Post
Cancel

Setting up an automated Red Team Infrastructure (REDCELL)

Redcell is an Infrastructure as Code Lab of red teamers operations , it’s built using Vagrant and Ansible , and it can be deployed and run locally . This lab is made of six virtual machines that seems necessary for the Cyber Kill Chain steps :

  • scanVM running kali-Linux machine with needed tools like Nmap , dirsearch , …

  • crackVM running Ubuntu machine with Hashcat tool installed

  • covenantVM running ubuntu machine with Covenant C2 tool installed and running on port 7443 .

  • covenantRedirector running ubuntu machine with nginx redirector and behaving as a reverse proxy for the covenantVM C2 machine .

  • phishingVM running ubuntu machine with gophish tool installed and running on ports 3333 and 80 .

  • gophishRedirector running ubuntu machine with nginx redirector and behaving as a reverse proxy for the phishingVM machine .

The lab setup is automated using vagrant and ansible automation tools.

The picture below show the Projects working principe:

I will talk about it on the Next few coming days…

Typing SVG

REDCELL’s PoC

The video below is the Poof of Concept of the REDCELL infrastructure project :

This post is licensed under CC BY 4.0 by the author.

Setting up an Nginx Redirector for covenant C2

Getting started with the Microsoft-Windows-Threat-Intelligence ETW Provider

Comments powered by Disqus.