CCDC Red Teams: Ten Tips to Maximize Success

The CCDC season is upon us. This is the time of year when professionals with many years of industry experience “volunteer” to hack against college students who must defend computer networks riddled with security holes. For the second year, my company is making Cobalt Strike available to members of the National CCDC and Regional CCDC red teams. […]

Read More… from CCDC Red Teams: Ten Tips to Maximize Success

Why I give all of my training material away—for free

I’m the developer of a commercial penetration testing product, Cobalt Strike. People are often amazed that I have a free 9-part Penetration Testing course on my website. This 9-part course is all of the material from my paid two-day class: Advanced Threat Tactics. Why do I give away my training product, for free? I know […]

Read More… from Why I give all of my training material away—for free

Four Levels of Hacking Sophistication with Beacon

Beacon is Cobalt Strike’s payload for red team actions. Beacon is a stable lifeline that can serve as a communication layer. Meterpreter is a fantastic post-exploitation agent with a lot of features.  Used together, Beacon and Meterpreter give you a lot of options for stealth and indirection. In this post, I’ll take you through different ways to use […]

Read More… from Four Levels of Hacking Sophistication with Beacon

Cloud-based Redirectors for Distributed Hacking

A common trait among persistent attackers is their distributed infrastructure. A serious attacker doesn’t use one system to launch attacks and catch shells from. Rather, they register many domains and setup several systems to act as redirectors (pivot points) back to their command and control server. As of last week, Cobalt Strike now has full […]

Read More… from Cloud-based Redirectors for Distributed Hacking

Cobalt Strike 01.08.14 – EXE Artifacts: A New Hope

Cobalt Strike has always exposed the Metasploit Framework’s tool to generate executables. Unfortunately, these executables are caught by anti-virus products. I’ve had a lot of feedback about this and I know it’s annoying. The latest release of Cobalt Strike now generates artifacts from its own Artifact Kit. The Artifact Kit is a proprietary source code […]

Read More… from Cobalt Strike 01.08.14 – EXE Artifacts: A New Hope

Man-in-the-Browser Session Hijacking

Malware like Zeus and its variants inject themselves into a user’s browser to steal banking information. This is a man-in-the-browser attack. So-called, because the attacker is injecting malware into the target’s browser. Man-in-the-browser malware uses two approaches to steal banking information. They either capture form data as it’s sent to a server. For example, malware […]

Read More… from Man-in-the-Browser Session Hijacking