IP masquerading

The frontend hides the C2 behind a normal-looking domain. The blue team’s first impression lands on a brochure site, not a beacon endpoint.

Domain selection

Buy two types of domain per operation:

  • One for workstation reverse shells: a profile that fits the target’s expected outbound web traffic. Marketing, news, SaaS, software updates.

  • One for server callbacks: something that fits server-to-server traffic. Telemetry endpoints, package mirrors, monitoring APIs.

Mixing the two on a single domain is loud. A workstation talking to an “update server” once a week is fine; a workstation talking to a “monitoring API” is suspicious.

Aging and reputation

  • Avoid freshly registered domains. Many DNS-layer filters block any domain younger than seven to thirty days.

  • Buy domains that are at least a few months old. Drop-catch services and aged-domain marketplaces sell these, but vet for prior abuse history.

  • Check reputation against URLhaus, VirusTotal, Cisco Talos, and the major DNS filters before going live.

  • Avoid TLDs with a poor reputation (.tk, .top, .xyz often get scored down even when clean).

Categorisation

Web filters route allow and deny decisions through category vendors (Cisco Talos, Palo Alto, Symantec, Bluecoat). A new domain sits in “uncategorised” by default, which many enterprises block outright. Submit the cover site to each vendor’s recategorisation portal once it is serving real-looking content.

One domain per operation

Burn the domain at the end of the engagement. Reusing names across operations links them under shared reputation lookups. Park the old DNS at a sinkhole or remove it entirely.

Cover content

The frontend serves plausible content on / and on any path the beacon does not claim. A static brochure site is enough. Keep it boring; do not link to anything on the open web from it.