CDN - Comain Fronting
How It Works
1. Attacker's C2 and legitimate site share same CDN (e.g., CloudFront)
2. TLS SNI (outer) shows: legitimate-site.com
3. HTTP Host header (inner) shows: attacker-c2.com
4. CDN routes based on Host header, not SNI
5. Network monitoring sees traffic to "legitimate-site.com"Finding Frontable Domains
Automated Discovery
# FindFrontableDomains
# https://github.com/rvrsh3ll/FindFrontableDomains
python3 FindFrontableDomains.py -d target-cdn.net
# Domain Fronting Tools
# https://github.com/stevecoward/domain-fronting-tools
python3 finder.py --cdn cloudfront
# DomainFrontingLists (pre-compiled lists)
# https://github.com/vysecurity/DomainFrontingListsManual Testing
CDN-Specific Techniques
Amazon CloudFront
Azure CDN
Google Cloud CDN
Fastly
Cloudflare
TLS 1.3 Considerations
C2 Framework Integration
Cobalt Strike
Sliver
Metasploit
Detection & Defense
Alternatives When Fronting Fails
Tools
Related Topics
Last updated
Was this helpful?