Geek Culture
Published in

Geek Culture

Configuring a Reverse Proxy for C2 Forwarding

Concealing Your Attacking Infrastructure

Hello, World! Setting up a reverse proxy in front of your C2 infrastructure backend helps protect the identity of your attacking servers and prevents them from being blacklisted by potential security solutions we might encounter during a pentest. In this blog, I am going to show you how to configure a basic C2 reverse…




A new tech publication by Start it up (

Recommended from Medium

India Fights COVID19 (IFC19) — a website I developed !

DEISER is on tour!

Sending a WhatsApp or SMS message in Golang

Microservices using Flask — creating a basic web flask application

How we test systems at OrbitSoft: functional, smoke, regression, and acceptance testing

How to Instantiate and Destroy Game Objects in Unity

Shortcut for cleaning up your local cocoapod repository

Start and Test our skeleton services

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alexis Rodriguez

Alexis Rodriguez

I am a Pentester who writes about Cybersecurity and anything related to technology.

More from Medium

ReDoS — Denial of Service by RegEx 😈

Bash Tricks for File Exfiltration over HTTP/S using Flask

Nmap’s Scripting Engine

Learning about Encryption, Encoding, and Hashing