C2 with Reverse-Proxy in Docker & analysis with WireShark

We'll create three containers, an Attacker, a Reverse-Proxy, and a Victim. 👹🤖🤔
We'll configure the reverse-proxy to serve a harmless website and proxy requests to our hidden attacker server. 😇😈
We'll use a RAT, a remote access tool, to control the victim. 🐀💀
We'll capture packets and analyze them. 🔍🤔

For more analyzing check out my TryHackMe Carnage room walkthrough!