Command and Control (C2)
What is Command and Control (C2)
A communication channel that allows an attacker to maintain control over a compromised system.
Expanded Explanation
In ethical hacking, a C2 server is used during red team engagements to simulate how real attackers manage infected machines. It enables remote command execution, data exfiltration, and persistence. Common C2 frameworks include Cobalt Strike and Metasploit.
Related Terms
Post-Exploitation, Persistence, Cobalt Strike, RAT, Lateral Movement
Want to learn more?
If you’re interested in Command and Control (C2), we recommend: Learn Ethical Hacking From Scratch Course
Check out our Online Ethical Hacking Courses.
✅ Lifetime access to lessons
✅ Learn the Fundamentals
✅ Learn at your own pace
✅ Designed for Beginner Friendly
✅ No programming or hacking experience needed.
✅ Get answers from our Support Team within a maximum of 15 hours.
✅ Unlimited Updates.
✅ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.