As a company specializing in realistic defensive training, we are highly interested in the inner workings of Command and Control (C2) frameworks. Empire is a modernized, open-source framework equipped with a wide array of capabilities. Examining its inner workings offers two opportunities: first, to improve adversary simulation, and second, to develop novel defensive techniques. While scrutinizing the staging and tasking processes, we pinpointed several vulnerabilities that an attacker could exploit to gain root access to a C2 server.