Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Discover a revolutionary approach to command and control infrastructure in this 16-minute DEF CON 33 conference talk that addresses the growing challenges of traditional HTTP C2 methods. Learn how aging domains, TLS certificate management, sandbox fingerprinting, and increasingly sophisticated blue team detection capabilities are making custom C2 frameworks more liability than asset. Explore the strategic shift toward living off legitimate services like AWS, GitHub, Box, and Notion that blend seamlessly into normal network traffic patterns. Understand the limitations of building custom solutions tied to single C2 frameworks and discover why the cybersecurity community needs shared, interoperable tools. Examine C4 (Cross-Compatible Command & Control), a modular toolkit powered by WASM plugins that simplifies external C2 implementation across multiple programming languages including C, Rust, Go, Python, and C#, while supporting Windows, macOS, and Linux target environments. Gain insights into C4's centralized collection of fully-documented, operationally-ready external C2 modules that go beyond proof-of-concepts to provide production-level integrations with trusted sites designed to evade detection. Learn how this approach eliminates the need to hunt through GitHub repositories, manually craft fragile API calls, or develop custom glue code for each new operational environment, ultimately transforming how red teams and security professionals approach covert communication infrastructure.
Syllabus
DEF CON 33 - Planting C4: Cross Compatible External C2 for Your Implants - Scott Taylor
Taught by
DEFCONConference