Skip to content

Wolf-dot/r-proxy-rat-blog

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

C2 + Reverse Proxy in Docker

We'll create three containers, an Attacker, a Reverse-Proxy, and a Victim. 👹🤖🤔
We'll configure the reverse-proxy to serve a harmless website and proxy requests to our hidden attacker server. 😇😈
We'll use a RAT, a remote access tool, to control the victim. 🐀💀
We'll capture packets and analyze them. 🔍🤔

This blog template is based on eleventy-high-performance-blog which itself is based on eleventy-base-blog.

About

C2 attack with Reverse Proxy in Docker and WireShark capture analysis

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

No packages published