// ATP C2 – CUSTOM COMMAND & CONTROL INFRASTRUCTURE

#C++ #C2 #MALWARE DEV #EDR EVASION #WINDOWS INTERNALS
Red Teaming & Evasion | Aug 2023 – Dec 2023 | STATUS: [ARCHIVED] | LANG: C++, ASM, PowerShell

Designed and implemented a custom Command & Control (C2) infrastructure to simulate sophisticated adversary behavior in controlled environments.

Tactical Implementation

  • Evasion Techniques: Developed a C++ implant featuring in-memory execution and advanced obfuscation to bypass static signature detection and dynamic analysis of enterprise AV/EDR solutions.
  • Custom Protocol: Engineered an encrypted communication protocol over HTTPS to blend C2 traffic with legitimate network noise, minimizing the probability of discovery during beaconing.
  • Operational Objective: Built to understand the offensive lifecycle and improve detection engineering capabilities (Purple Teaming) by analyzing the artifacts left behind by custom implants.

Knowledge Gained

This project served as a deep dive into Windows Internals, specifically focusing on how modern defensive solutions hook APIs and how those hooks can be bypassed or avoided through direct system calls and manual mapping.

<- RETURN_TO_PROJECT_INDEX