Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…

Cobalt Strike’s Covert VPN feature now supports ICMP as one of its channels. Covert VPN is Cobalt Strike’s layer-2 pivoting capability. If you’re curious about how this technology works, I released some source code a few weeks ago. The ICMP data channel is a turn-key way to demonstrate ICMP as an exfiltration channel if you […]

Read More… from Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…

Cobalt Strike 2.1 – I have the POWER(shell)

For a long time, I’ve wanted the ability to use PowerUp, Veil PowerView, and PowerSploit with Cobalt Strike. These are useful post-exploitation capabilities written in PowerShell. You’d think that it’s easy to run a script during the post-exploitation phase, especially when this script is written in the native scripting environment for Windows. It’s harder than […]

Read More… from Cobalt Strike 2.1 – I have the POWER(shell)

Cobalt Strike 01.08.14 – EXE Artifacts: A New Hope

Cobalt Strike has always exposed the Metasploit Framework’s tool to generate executables. Unfortunately, these executables are caught by anti-virus products. I’ve had a lot of feedback about this and I know it’s annoying. The latest release of Cobalt Strike now generates artifacts from its own Artifact Kit. The Artifact Kit is a proprietary source code […]

Read More… from Cobalt Strike 01.08.14 – EXE Artifacts: A New Hope