Example of Cleartext Cobalt Strike Traffic
https://www.sesin.at/2021/04/17/example-of-cleartext-cobalt-strike-traffic-thanks-brad-mon-apr-12th/
https://www.sesin.at/2021/04/17/example-of-cleartext-cobalt-strike-traffic-thanks-brad-mon-apr-12th/
Detecting Exposed Cobalt Strike DNS Redirectors
https://labs.f-secure.com/blog/detecting-exposed-cobalt-strike-dns-redirectors
https://labs.f-secure.com/blog/detecting-exposed-cobalt-strike-dns-redirectors
Detecting Malicious C2 Activity -SpawnAs & SMB Lateral Movement in CobaltStrike
https://dansec.medium.com/detecting-malicious-c2-activity-spawnas-smb-lateral-movement-in-cobaltstrike-9d518e68b64
https://dansec.medium.com/detecting-malicious-c2-activity-spawnas-smb-lateral-movement-in-cobaltstrike-9d518e68b64
Medium
Detecting Malicious C2 Activity -SpawnAs & SMB Lateral Movement in CobaltStrike
Understanding common attack vectors and how threat actors move in your environment post-compromise is critical to identifying what kind of…
Quickpost: Decrypting Cobalt Strike Traffic
https://blog.didierstevens.com/2021/04/26/quickpost-decrypting-cobalt-strike-traffic/
https://blog.didierstevens.com/2021/04/26/quickpost-decrypting-cobalt-strike-traffic/
Didier Stevens
Quickpost: Decrypting Cobalt Strike Traffic
I have been looking at several samples of Cobalt Strike beacons used in malware attacks. Although work is still ongoing, I already want to share my findings. Cobalt Strike beacons communicating ove…
Anatomy of Cobalt Strike’s DLL Stager
https://blog.nviso.eu/2021/04/26/anatomy-of-cobalt-strike-dll-stagers/
https://blog.nviso.eu/2021/04/26/anatomy-of-cobalt-strike-dll-stagers/
NVISO Labs
Anatomy of Cobalt Strike’s DLL Stager
This blog post will cover the Cobalt Strike DLL stager's anatomy, design choices and highlight ways to reduce both log footprint and time-to-shellcode.
Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon.
https://github.com/sec-consult/aggrokatz/
https://github.com/sec-consult/aggrokatz/
GitHub
GitHub - sec-consult/aggrokatz: Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface…
Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract...
CobaltStrike Stager Utilizing Floating Point Math
https://medium.com/walmartglobaltech/cobaltstrike-stager-utilizing-floating-point-math-9bc13f9b9718
https://medium.com/walmartglobaltech/cobaltstrike-stager-utilizing-floating-point-math-9bc13f9b9718
Medium
CobaltStrike Stager Utilizing Floating Point Math
By: Jason Reaves and Joshua Platt
Improving the network-based detection of Cobalt Strike C2 servers in the wild while reducing the risk of false positives
https://sergiusechel.medium.com/improving-the-network-based-detection-of-cobalt-strike-c2-servers-in-the-wild-while-reducing-the-6964205f6468
https://sergiusechel.medium.com/improving-the-network-based-detection-of-cobalt-strike-c2-servers-in-the-wild-while-reducing-the-6964205f6468
Medium
Improving the network-based detection of Cobalt Strike C2 servers in the wild while reducing the risk of false positives
Context
redwarden - Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
https://github.com/mgeeky/redwarden
https://github.com/mgeeky/redwarden
GitHub
GitHub - mgeeky/RedWarden: Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection…
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation - mgeeky/RedWarden
DomainBorrowingC2 - An extension for Cobalt Strike written in C# using Cobalt Strike's External C2 spec.
https://github.com/Cerbersec/DomainBorrowingC2
https://github.com/Cerbersec/DomainBorrowingC2
GitHub
GitHub - Cerbersec/DomainBorrowingC2
Contribute to Cerbersec/DomainBorrowingC2 development by creating an account on GitHub.
This is how the Cobalt Strike penetration testing tool is being abused by cybercriminals
https://www.zdnet.com/article/this-is-how-the-cobalt-strike-penetration-testing-tool-is-being-abused-by-cybercriminals/
https://www.zdnet.com/article/this-is-how-the-cobalt-strike-penetration-testing-tool-is-being-abused-by-cybercriminals/
ZDNET
This is how the Cobalt Strike penetration testing tool is being abused by cybercriminals
Cobalt Strike is a popular tool with cybersecurity professionals. Unfortunately, it’s also utilized by threat actors.
Unveiling DNSStager: A tool to hide your payload in DNS
https://shells.systems/unveiling-dnsstager-a-tool-to-hide-your-payload-in-dns/
https://shells.systems/unveiling-dnsstager-a-tool-to-hide-your-payload-in-dns/
Shells.Systems
Unveiling DNSStager: A tool to hide your payload in DNS - Shells.Systems
Estimated Reading Time: 8 minutes In the past few weeks, I was working on a new project that could help me to solve an issue during a case I was facing, I needed a tool to help me pulling off my payload through DNS without being noisy or suspicious with the…