C2
Last updated
Last updated
a configuration file that specifies how a red team's command and control (C2) infrastructure communicates with a target network. the file consists of IP addresses, C2 server ports, communication encryption methods and data collection types. red teamers uses the C2 profiles to configure its malware to communicate with the C2 server in a way that evades detection and provides the desired access and control over the target network.