Revisiting the UDRL Part 3: Beacon User Data

The UDRL and the Sleepmask are key components of Cobalt Strike’s evasion strategy, yet historically they have not worked well together. For example, prior to CS 4.10, Beacon statically calculated its location in memory using a combination of its base address and its section table. This calculation was then modified depending on the contents of […]

Read More… from Revisiting the UDRL Part 3: Beacon User Data

Welcome Darknet Diaries Listeners!

The Cobalt Strike team is excited to sponsor the Darknet Diaries podcast, which brings awareness to critical cybersecurity issues and encourages proactive efforts that bolster defenses against modern threats and attackers. Cobalt Strike is a threat emulation tool that enables security professionals to simulate the tactics and techniques of a stealthy long-term embedded attacker in […]

Read More… from Welcome Darknet Diaries Listeners!

[PPC] Upskilling Guide – CTA

To protect vital systems and data, organizations must create cybersecurity programs containing the right mix of security tools and skilled personnel. This is especially challenging since effective security strategies include offensive or proactive tactics, like pen testing and red teaming, which require staff members with specialized expertise and certifications. Given that the current cybersecurity skills […]

Read More… from [PPC] Upskilling Guide – CTA