For a long time, I’ve wanted the ability to use PowerUp, Veil PowerView, and PowerSploit with Cobalt Strike. These are useful post-exploitation capabilities written in
Cobalt Strike 2.0 introduced Malleable C2, a technology to redefine network indicators in the Beacon payload. What does this mean for you? It means you
Back in May, I wrote up some impressions about Meterpreter’s Kiwi extension. It’s Mimikatz 2.0, complete with its ability to generate a Kerberos “Golden Ticket” with
I define threat replication as a penetration test that looks like an attack from an APT actor. Assessments that involve threat replication are more than
High latency communication allows you to conduct operations on your target’s network, without detection, for a long time. An example of high-latency communication is a