Greetings, readers! During the last month, I learned about Nebula, a tool created by the developers of Slack, which enables systems across the globe to come together in a software-defined virtual private network. Excited by the new tech, I decided to use Nebula as a Command and Control (C&C) system for creating “Red-Team” drop boxes.

A “Red-Team” drop box is, essentially, a discreet, inexpensive computer capable of running a full suite of pentesting tools. The system is intended to be dropped into a client’s internal network, thus providing secure backdoor access to the pentester.

In most of the tutorials I read, SSH was used to connect the drop box to the outside world. However, this didn’t seem to be an optimal method, due to concerns with security and scalability. Nebula, it seemed, would provide an answer to this problem! By being peer-to-peer, end-to-end encrypted, and mutually-authenticated, it overcomes the vast majority of problems with SSH-based C&C. (It is not without its faults, however.)

After creating a Proof-of-Concept system, I presented my findings at my local hacker meet-up with a 10-minute fire talk. At the end of the talk, I promised that I would publish a full tutorial for creating a Nebula-powered “Red-Team” drop box.

Here’s the tutorial, as promised.

Let me know what you think!