We'll create three containers, an Attacker, a Reverse-Proxy, and a Victim. 👹🤖🤔
We'll configure the reverse-proxy to serve a harmless website and proxy requests to our hidden attacker server. 😇😈
We'll use a RAT, a remote access tool, to control the victim. 🐀💀
We'll capture packets and analyze them. 🔍🤔
This blog template is based on eleventy-high-performance-blog which itself is based on eleventy-base-blog.