githubEdit

CDN - Comain Fronting

Domain fronting uses CDN infrastructure to hide C2 traffic by making requests appear to go to legitimate domains.

How It Works

1. Attacker's C2 and legitimate site share same CDN (e.g., CloudFront)
2. TLS SNI (outer) shows: legitimate-site.com
3. HTTP Host header (inner) shows: attacker-c2.com
4. CDN routes based on Host header, not SNI
5. Network monitoring sees traffic to "legitimate-site.com"

Finding Frontable Domains

Automated Discovery

# FindFrontableDomains
# https://github.com/rvrsh3ll/FindFrontableDomains
python3 FindFrontableDomains.py -d target-cdn.net

# Domain Fronting Tools
# https://github.com/stevecoward/domain-fronting-tools
python3 finder.py --cdn cloudfront

# DomainFrontingLists (pre-compiled lists)
# https://github.com/vysecurity/DomainFrontingLists

Manual Testing

CDN-Specific Techniques

Amazon CloudFront

Azure CDN

Google Cloud CDN

Fastly

Cloudflare

TLS 1.3 Considerations

C2 Framework Integration

Cobalt Strike

Sliver

Metasploit

Detection & Defense

Alternatives When Fronting Fails

Tools

Last updated

Was this helpful?