Since malware evolved with time, they have to communicate with a server to work smoothly. Most of them always used the gold old “client-server” model. That’s the basics of a botnet where we have “bots” waiting for commands from their master. From a malware developer’s perspective, the implementation of this communication channel has always been a key element because it must happen below the radar. I’ll provide a recap of the C2 protocols from the past to today and tomorrow and show you common tactics used by attackers to interact with the infected computers.