Skip to main content

C2 Infrastructure Mapping

The C2 Infrastructure section lets you map out your command-and-control setup during an engagement. You can visually track your beacons, relay nodes, redirectors, and their relationships in a hierarchical tree.


What Is C2 Infrastructure Mapping?

RTF Login Screen

During a red team engagement, you deploy infrastructure to control compromised machines:

  • Listeners / Team servers — your origin C2 nodes
  • Redirectors — intermediate nodes that forward traffic
  • Beacons / Implants — the compromised machines calling back

RTF lets you document all of this in a structured, visual way — so your team always knows what's deployed and where.


C2 Frameworks

RTF comes pre-configured with the most common C2 frameworks:

FrameworkType
Cobalt StrikeCommercial
HavocOpen source
SliverOpen source
EmpireOpen source
MetasploitOpen source

You can also add custom frameworks for any other C2 tool you use.


Adding a C2 Framework

Before adding nodes, you need to define which framework you're using:

  1. Go to C2 Infrastructure → Frameworks

  2. Click Add Framework

  3. Fill in:

    FieldDescription
    NameFramework name (e.g., "Cobalt Strike")
    DescriptionOptional notes
    Communication Channelse.g., HTTPS, DNS, SMB
    Beacon NameWhat you call your implants (e.g., "Beacon", "Agent", "Session")
  4. Click Save


Adding Nodes (Beacons / Redirectors)

A node represents any machine in your C2 chain — whether it's a redirector, a listener, or a compromised host.

To add a node:

  1. Go to C2 Infrastructure → Nodes

  2. Click Add Node

  3. Fill in the details:

    FieldRequiredDescription
    IP AddressYesThe node's IP
    OSYesWindows, Linux, macOS, or Unknown
    ChannelYesCommunication channel (HTTPS, DNS, etc.)
    TTPYesThe MITRE technique this node relates to
    FrameworkYesWhich C2 framework this node belongs to
    Is OriginToggle on if this is a team server / listener
    Parent IPNoThe node this one connects to (for redirectors and beacons)
    DescriptionNoAdditional notes
    TagsNoLabels like "redirector", "beacon", "pivot"
  4. Click Save


Understanding the Node Hierarchy

Nodes are organized in a tree structure:

Origin Node (Team Server)
└─ Redirector
├─ Beacon (Compromised Host A)
└─ Beacon (Compromised Host B)
└─ Pivot Node (deeper in network)
  • Depth 0 — Origin (your team server / listener)
  • Depth 1 — Nodes connected directly to origin (redirectors, direct beacons)
  • Depth 2+ — Deeper nodes (pivots, beacons through redirectors)

Viewing the Infrastructure Tree

Click Infrastructure Tree to see your full C2 setup visualized as an interactive tree diagram. You can:

  • See which machines are active in your chain
  • Track communication paths
  • Identify pivot points

Infrastructure Statistics

The Statistics view shows:

  • Total frameworks deployed
  • Total number of nodes
  • Number of origin nodes (team servers)
  • Breakdown by framework

Organizing by Engagement

C2 nodes are tied to your engagement (profile) and optionally to a subprofile. This means:

  • Each engagement has its own isolated C2 map
  • You can filter nodes by subprofile if you have segmented targets

Tips

  • Add nodes as you deploy them — don't try to reconstruct the map at the end
  • Use Tags to label node roles (redirector, beacon, pivot, exfil)
  • Set Is Origin only on your actual team servers — this keeps the tree structure clean
  • Document the channel accurately — it helps in reporting (e.g., "HTTPS beacons over port 443 through AWS redirector")

Next Steps