FW RULES
C2 AGENT RULE
root@oco:~$ BROWSER > AZURE/AWS > Settings > Networking > Add inbound port rule
#this creates an inbound rule where only the Red Team operators can access the C2 server
#the red team operators are in the 49.36.41.230 IP while the c2 is in 20.66.23.137
Rule: SSH //the ssh to the nginx vm is only accessible by 49.36.41.242 (attacker)
Priority: 300
Port: 22
Protocol: TCP
Source: 49.36.41.242
Destination: Any
Action: Allow
Rule: AllowHTTPInbound
Priority: 310
Port: 80
Protocol: TCP
Source: 49.36.41.182
Destination: Any
Action: Allow
Rule: AllowHTTPSInbound
Priority: 320
Port: 443 //port 443 is accessible by anyone
Protocol: TCP
Source: Any
Destination: Any
Action: Allow
#port 5555 is only accessible by 20.66.87.234 (the victim)
#ensure that the payload server's hidden directory "cwl" can't be easily brute forced by anyone to include by the blue team
#it is highly recommended to use a directory name with long name and can't be easily brute forced
#https://{nuclear.cyberwarfare.live}/cwl or arbitraryLongNamedDirectory
Rule: AllowMyIpAddressCustom5555Inbound ///payload server port
Priority: 330
Port: 5555
Protocol: Any
Source: 20.66.87.234
Destination: Any
Action: Allow
Rule: AllowVnetInbound
Priority: 65000
Port: Any
Protocol: Any
Source: VirtualNetwork
Destination: VirtualNetwork
Action: Allow
Rule: AllowAzureLoadBalancerInbound
Priority: 65001
Port: Any
Protocol: Any
Source: AzureLoadBalancer
Destination: Any
Action: Allow
Rule: DenyAllInbound
Priority: 65500
Port: Any
Protocol: Any
Source: Any
Destination: Any
Action: Deny
SAMPLE 2
PAYLOAD SERVER FW RULES
Last updated