Connecting to a Metasploit RPC server on Windows is not supported

When a user launches Armitage or Cobalt Strike on Windows and presses Start MSF, they’re presented with a curious error. It states: You must connect to a team server hosted on Linux. Connecting to a Metasploit RPC server on Windows is not supported. This error generates a lot of requests for help in various forums […]

Read More… from Connecting to a Metasploit RPC server on Windows is not supported

Meterpreter Kiwi Extension: Golden Ticket HOWTO

Mimikatz is a rapidly evolving post-exploitation toolkit by Benjamin Delpy. I call it a post-exploitation toolkit because it has a lot of features, far beyond the ability to dump plain-text passwords. One of the interesting features in Mimikatz 2.0 is its ability to generate a Kerberos ticket for a domain administrator with a lifetime of 10 […]

Read More… from Meterpreter Kiwi Extension: Golden Ticket HOWTO

Covert Lateral Movement with High-Latency C&C

High latency communication allows you to conduct operations on your target’s network, without detection, for a long time. An example of high-latency communication is a bot that phones home to an attacker’s web server to request instructions once each day. High latency communication is common with advanced threat malware. It’s not common in penetration testing […]

Read More… from Covert Lateral Movement with High-Latency C&C

Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.

I spend a lot of time on the road in March and April—using my tools. During these months, I take careful notes of the usability issues I’d like to address and small tweaks that would make life better for Cobalt Strike’s hacker corps. Today’s Cobalt Strike release is the result of notes and my first-hand […]

Read More… from Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.

What happens when I type getsystem?

Meterpreter’s getsystem command is taken for granted. Type getsystem and magically Meterpreter elevates you from a local administrator to the SYSTEM user. What’s really happening though? The getsystem command has three techniques. The first two rely on named pipe impersonation. The last one relies on token duplication. Let’s go through them: Technique 1 creates a […]

Read More… from What happens when I type getsystem?

Listeners: Cobalt Strike’s Glue Feature

Listeners are Cobalt Strike’s abstraction in front of the Metasploit Framework’s payload handlers. A handler is the exploit/multi/handler module. This module sets up a server that waits for a payload on a compromised system to connect to you. Cobalt Strike’s listeners feature is a way to configure handlers that start when Cobalt Strike starts. A listener consists […]

Read More… from Listeners: Cobalt Strike’s Glue Feature

User Account Control – What Penetration Testers Should Know

UAC is User Account Control. Introduced in Windows Vista, UAC is a collection of technologies that make it convenient possible to use Windows without administrator privileges and elevate your rights when needed. UAC has a lot of moving parts and encompasses a lot of things. This post focuses on Windows Integrity levels and UAC elevation […]

Read More… from User Account Control – What Penetration Testers Should Know

Cobalt Strike 03.13.14 – NECCDC Edition

I’m writing this from a New Hampshire Bed and Breakfast where I’ve apparently received the Jacuzzi suite. I’m here for a romantic weekend running psexec and managing Beacons inside of student networks for the North East Collegiate Cyber Defense Competition event. This is my seventh year with this event. I made a lot of development progress early into my […]

Read More… from Cobalt Strike 03.13.14 – NECCDC Edition