The Origin of Armitage’s Hail Mary Mass Exploitation Feature

Several times now, an author has introduced Armitage, and the main value add to the hacking process that they emphasize is the “devastating” Hail Mary attack. I’m most proud of Armitage’s red team collaboration capability–it’s why I built the tool in the first place. The Hail Mary attack? Meh. That said, I’d like to share with you […]

Read More… from The Origin of Armitage’s Hail Mary Mass Exploitation Feature

Staged Payloads – What Pen Testers Should Know

The Metasploit Framework decouples exploits from the stuff that gets executed after successful exploitation (the payload). Payloads in the Metasploit Framework are also divided into two parts, the stager and the stage. The stager is responsible for downloading a large payload (the stage), injecting it into memory, and passing execution to it. Staging first came […]

Read More… from Staged Payloads – What Pen Testers Should Know

That’ll never work–we don’t allow port 53 out

One of my favorite Cobalt Strike features is its ability to quietly manage a compromised system with DNS. Being rather proud of this feature, I talk about it a lot. During some conversations, I’ve heard the response “that’ll never work, we don’t allow port 53 out, unless it’s our internal DNS server”. To which I reply, […]

Read More… from That’ll never work–we don’t allow port 53 out