Blog Cobalt Strike 2.4 – A Pittance for Post-Exploitation Cobalt Strike 2.4 is now available. If you use Beacon for post-exploitation, you’ll find a lot to like in this release. Here’s the highlights: Post-Exploitation Jobs
Blog Reverse Port Forward through a SOCKS Proxy I had a friend come to me with an interesting problem. He had to get a server to make an outbound connection and evade some
Blog Training Recommendations for Threat Emulation and Red Teaming A few weeks ago, I had someone write and ask which training courses I would recommend to help setup a successful Red Team program. If
Blog The First Five Minutes March and April are CCDC season. This is the time of the year when teams of college students get to compete against each other as
Blog My Favorite PowerShell Post-Exploitation Tools PowerShell became a key part of my red team toolkit in 2014. Cobalt Strike 2.1 added PowerShell support to the Beacon payload and this has made
Blog Another Night, Another Actor Earlier last year, I had a frantic call from a customer. They needed to make a small change to Beacon’s communication pattern and quickly. This
Blog DNS Communication is a Gimmick I added DNS Communication to Cobalt Strike in June 2013 and refined it further in July 2013. On sales calls and at conferences I get
Blog How I tunnel Meterpreter through Beacon I write so many blog posts about Beacon, I should just give up and call this the Beacon blog. Beacon is Cobalt Strike’s post-exploitation agent
Blog Cobalt Strike 2.3 – I’ve always wanted runas Cobalt Strike 2.3 is now available. This release adds a runas command to Beacon. This command allows you to specify a username and password for any
Blog Pass-the-(Golden)-Ticket with WMIC One of my favorite blog posts from last year was the Adversary Tricks and Treats post from CrowdStrike. They showed how one of the actors