• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

BounceBack: Shield protects C2/Phishing infrastructure from attacks

AnonyViet by AnonyViet
November 18, 2024
in Security
0

Protecting infrastructure from cyber attacks is becoming increasingly important. Especially for C2/Phishing systems, anonymity and security are key factors to maintain operations. BounceBack – a powerful and flexible reverse proxy – is designed to meet this need. With high customization, smart filtering system and WAF integration, BounceBack is the optimal solution to protect your infrastructure from surveillance and attacks.

Join the channel Telegram belong to AnonyViet 👉 Link 👈

Introducing BounceBack

BounceBack is a powerful reverse proxy, highly customizable and flexible in configuration, integrating WAF (Web Application Firewall) function to help hide your C2/phishing infrastructure from the security team's eyes (blue). team), sandbox, scanning tools, etc. It uses real-time traffic analysis through many filters to prevent illegal access.

The tool is delivered with a list of blocked words, blocked IP addresses, and preconfigured permissions. For more information on how to use the tool, you can visit the project's wiki below:

Github link

Introducing BounceBack
Introducing BounceBack

See more: De digger: Tool to find other people's files on Google Drive

Outstanding features of BounceBack

BounceBack possesses many superior features to help protect your infrastructure effectively:

  • Highly customizable and flexible filtering system: With the ability to combine boolean-based rules (and, or, not), BounceBack can hide your infrastructure from even the most critical eyes of your security team. .
  • Easily extensible project structure: Everyone can add their own C2 rules, increasing flexibility and customization.
  • Massive IP blacklist integration: This list includes IP ranges and IPv4 pools known to be relevant to IT security vendors, combined with IP filtering to prevent them from using/downgrading attacks. your floor.
  • Malleable C2 Configuration Analyzer: BounceBack can validate incoming HTTP(s) traffic against Malleable configuration and reject invalid packets.
  • Domain Fronting support: This feature helps you hide your infrastructure more effectively.
  • Check IP geolocation: BounceBack can check the request's IPv4 address against IP geo/reverse lookup data and compare it with specified regular expressions to rule out connections from Outside companies, countries, cities, domains, etc. are allowed.
  • Uptime Filter: All incoming requests can be allowed/disallowed for any time period, so you can configure uptime filters.
  • Multiple proxy support: BounceBack supports multiple proxies with different filtering pipelines on the same instance.
  • Detailed logging mechanism: Allows you to track all incoming requests and events to analyze security team behavior and debug incidents.
BounceBack has a huge IP blacklist built-in
BounceBack has a huge IP blacklist built-in

Mechanism of action of the rule

The main idea of ​​the rules is how BounceBack matches traffic. The tool currently supports the following rule types:

  • Boolean-based rule combination (and, or, not)
  • Analyze IP and subnet
  • Check the IP geolocation fields
  • Reverse domain lookup
  • Raw package regular expression matching
  • Malleable C2 configuration traffic authentication
  • Working (or non-working) hour rules
  • Custom Rules: Custom rules can be easily added by registering RuleBaseCreator or RuleWrapperCreator your. See the RuleBaseCreator and RuleWrapperCreator already created in the project.

You can find the rules configuration page HERE

Proxy configuration and supported protocols

The proxy section is used to configure where to listen and proxy traffic, what protocols to use, and how to bind rules together to filter traffic. Currently, BounceBack supports the following protocols:

  • HTTP(s): For your web infrastructure.
  • DNS: For your DNS tunnels.
  • Raw TCP (with or without tls) and UDP: For custom protocols.
  • Custom Protocols: Custom protocols can be easily added by registering your new type in management program. You can find examples of proxies here.

You can find the proxy configuration page at this page.

Proxy configuration and supported protocols
Proxy configuration and supported protocols

Instructions for installing BounceBack

Method 1: Install from release

Download the latest release from this page > Extract folder > Edit configuration file > Launch BounceBack.

Method 2: Install from source code

Clone the project (don't forget GitLFS) > Settings goreleaser > Run command:

goreleaser release --clean --snapshot

How to use BounceBack

Step 1 (optional): Update banned_ips.txt list:

list:bash scripts/collect_banned_ips.sh > data/banned_ips.txt

Step 2: Edit config.yml for your needs: Configure rules to match traffic, proxies to analyze traffic using rules, and global variables for in-depth rule configuration.

Step 3: Run BounceBack: ./bounceback

Command line options:

  • -c, –config string: Path to the configuration file in YAML format (default is “config.yml”).
  • -l, –log string: Path to the log file (default is “bounceback.log”).
  • -v, –verbose count: Log details (0 = info, 1 = debug, 2+ = trace).

See more: DNS Spy: Tool to analyze DNS of any Domain

Conclusion

BounceBack is a flexible tool that helps protect C2/phishing infrastructure. With its highly customizable, flexible filtering system and support for a wide range of protocols, BounceBack is an ideal choice to enhance the security of your system.

Tags: attacksBounceBackC2PhishinginfrastructureProtectsShield
Previous Post

How to use Gemini AI on iOS: Vietnamese voice chat, create photos,…

Next Post

10 Great Tips on Desktop Windows 10 that you may not know

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
10 Great Tips on Desktop Windows 10 that you may not know

10 Great Tips on Desktop Windows 10 that you may not know

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
[Godot Shooter] #2: Creating characters & shooting bullets

[Godot Shooter] #2: Creating characters & shooting bullets

June 7, 2025
Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply