Introduction
What?
Redirectors proxy requests coming from the target back to our attack infrastructure.
Why?
Reusing IP addresses will immediately attract attention of someone on the blue team
If the IP address of a C2 server controlling dozens of machines on a target is blacklisted, we must be able to roll out a new server in a matter of seconds with a fresh IP to receive new connections, without interrupting ongoing jobs not subject to the IP ban.
We need to be able to serve multiple clients/targets. Too much from one IP address makes for suspicions.
How?
Set up a redirector for each specific operation.
Note the solution with bounce servers is much more elegant and quick.