Blog Hacking through a Straw (Pivoting over DNS) Last month, I announced Beacon’s ability to control a host over DNS. I see Beacon as a low and slow lifeline to get an active session,
Blog Staged Payloads – What Pen Testers Should Know The Metasploit Framework decouples exploits from the stuff that gets executed after successful exploitation (the payload). Payloads in the Metasploit Framework are also divided into
Blog That’ll never work–we don’t allow port 53 out One of my favorite Cobalt Strike features is its ability to quietly manage a compromised system with DNS. Being rather proud of this feature, I
Blog DNS Command and Control Added to Cobalt Strike Many networks are like sieves. A reverse TCP payload or an HTTP/S connection is all it takes to get out. Once in a while, you
Blog Metasploit 4.6 – Now with less Open Source GUI Last week, I received an email from Tod B. at Rapid7 stating that the next binary installer of Metasploit would ship without Armitage and msfgui.
Blog Pivoting through SSH This is a pretty quick tip, but still useful. When you SSH to a host, you may use the -D flag to setup “dynamic” application-level
Blog Missing in Action: Armitage on Kali Linux As you may know, the highly anticipated Kali Linux is now available. If you’ve fired it up, you may notice it’s missing a familiar tool.
Blog HOWTO Integrate third-party tools with Cortana One of the goals of Cortana is to give you the ability to integrate third-party tools and agents into Armitage and Cobalt Strike’s red team
Blog Deprecation Notice: Metasploit source checkouts will NO LONGER update over SVN – Move to Git The official home of the Metasploit Framework’s source code has been github for a while now. Ever since the move to Git, Rapid7 has operated
Blog Cobalt Strike Boxed Set comes to ShmooCon It’s the middle of February, love is in the air, and… I’m busy preparing for my favorite hacker conference ShmooCon. This year, for the second