Staged Payloads – What Pen Testers Should Know

The Metasploit Framework decouples exploits from the stuff that gets executed after successful exploitation (the payload). Payloads in the Metasploit Framework are also divided into two parts, the stager and the stage. The stager is responsible for downloading a large payload (the stage), injecting it into memory, and passing execution to it. Staging first came […]

Read More… from Staged Payloads – What Pen Testers Should Know

That’ll never work–we don’t allow port 53 out

One of my favorite Cobalt Strike features is its ability to quietly manage a compromised system with DNS. Being rather proud of this feature, I talk about it a lot. During some conversations, I’ve heard the response “that’ll never work, we don’t allow port 53 out, unless it’s our internal DNS server”. To which I reply, […]

Read More… from That’ll never work–we don’t allow port 53 out