C2 servers are used to remotely control compromised systems while avoiding detection.
Covenant (Option B):
Covenant is an advanced C2 framework designed for stealthy post-exploitation in red team operations.
Supports encrypted communication, privilege escalation, and evasion techniques.
[Reference: CompTIA PenTest+ PT0-003 Official Study Guide - "C2 Frameworks in Post-Exploitation", Incorrect options:, Option A (ProxyChains): Used for proxying connections, but not a C2 framework., Option C (PsExec): A Windows command-line tool for remote execution, but not a C2 tool., Option D (sshuttle): Used for network tunneling, not full C2., ]
Submit