Blog Hacking through a Straw (Pivoting over DNS) Last month, I announced Beacon’s ability to control a host over DNS. I see Beacon as a low and slow lifeline to get an active session,
Blog Staged Payloads – What Pen Testers Should Know The Metasploit Framework decouples exploits from the stuff that gets executed after successful exploitation (the payload). Payloads in the Metasploit Framework are also divided into
Blog That’ll never work–we don’t allow port 53 out One of my favorite Cobalt Strike features is its ability to quietly manage a compromised system with DNS. Being rather proud of this feature, I
Blog Metasploit 4.6 – Now with less Open Source GUI Last week, I received an email from Tod B. at Rapid7 stating that the next binary installer of Metasploit would ship without Armitage and msfgui.
Blog Pivoting through SSH This is a pretty quick tip, but still useful. When you SSH to a host, you may use the -D flag to setup “dynamic” application-level
Blog Missing in Action: Armitage on Kali Linux As you may know, the highly anticipated Kali Linux is now available. If you’ve fired it up, you may notice it’s missing a familiar tool.
Blog HOWTO Integrate third-party tools with Cortana One of the goals of Cortana is to give you the ability to integrate third-party tools and agents into Armitage and Cobalt Strike’s red team
Blog Cobalt Strike Updates 03.06.13 Just in time for this weekend’s North East Collegiate Cyber Defense Competition event, I have a fresh update to Armitage and Cobalt Strike. Here’s the
Blog Deprecation Notice: Metasploit source checkouts will NO LONGER update over SVN – Move to Git The official home of the Metasploit Framework’s source code has been github for a while now. Ever since the move to Git, Rapid7 has operated
Blog My Software Development Practices: The Joel Test Joel Spolsky is one of my favorite writers on the topic of software development. He coined a 12-step Joel Test to determine if your company