Reverse Meterpreter Connect-backs through a Compromised Host

<update 03:30pm> I’ve had some feedback that this post describes a concept that is too basic to put into blog form. I can see where this confusion may occur. Most literature that describes pivoting through Meterpreter, shows how to setup a payload connection that goes through Meterpreter (e.g., a bind payload). What isn’t well known or documented, […]

Read More… from Reverse Meterpreter Connect-backs through a Compromised Host

Cobalt Strike 1.48 – Peer-to-peer C&C

I’m pleased to announce Cobalt Strike 1.48. This release introduces a peer-to-peer data channel for Beacon, improves browser pivoting, and updates the signed applet attack with options the latest Java 1.7 updates require. Peer-to-Peer Beacon It’s hard to stay hidden when many compromised systems call out to the internet. To solve this problem, Beacon now supports peer-to-peer command and […]

Read More… from Cobalt Strike 1.48 – Peer-to-peer C&C

The ACE Problem Solving Method (I use this)

The reason I’m in security today is because of the US Air Force’s Advanced Course in Engineering Cyber Security internship program. I turned down an internship at NASA (after I accepted it!) to attend this “information warfare bootcamp” in 2003. The Air Force Research Lab modeled the ACE program after General Electric’s Advanced Course in Engineering. Each week, the […]

Read More… from The ACE Problem Solving Method (I use this)