Cobalt Strike Sleep Python Bridge

This project started after seeing how the user community tweaks and tunes Cobalt Strike. I was inspired by @BinaryFaultline and @Mcgigglez16 in their project https://github.com/emcghee/PayloadAutomation and blog post http://blog.redxorblue.com/2021/06/introducing-striker-and-payload.html. They created a clever way to interact with a teamserver without the GUI. Before I get too far, I’ll touch on Aggressor scripting and the Sleep […]

Read More…

The post Cobalt Strike Sleep Python Bridge appeared first on Cobalt Strike Research and Development.

Continue reading Cobalt Strike Sleep Python Bridge

Cobalt Strike Sleep Python Bridge

This project started after seeing how the user community tweaks and tunes Cobalt Strike. I was inspired by @BinaryFaultline and @Mcgigglez16 in their project https://github.com/emcghee/PayloadAutomation and blog post http://blog.redxorblue.com/2021/06/introducing-striker-and-payload.html. They created a clever way to interact with a teamserver without the GUI. Before I get too far, I’ll touch on Aggressor scripting and the Sleep […]

Read More…

The post Cobalt Strike Sleep Python Bridge appeared first on Cobalt Strike Research and Development.

Continue reading Cobalt Strike Sleep Python Bridge

12 Benefits of Hiring a Certified Ethical Hacker

You’ve probably heard the phrase “you don’t know what you don’t know”. It’s a stage of learning most people find themselves in at one time or another. When it comes to cybersecurity, hackers succeed by finding the security gaps and vulnerabilities you missed. That’s true of malicious attackers. But it’s also true of their equivalent […]

The post 12 Benefits of Hiring a Certified Ethical Hacker appeared first on Security Intelligence.

Continue reading 12 Benefits of Hiring a Certified Ethical Hacker

How to Extend Your Reach with Cobalt Strike 

We’re often asked, “what does Cobalt Strike do?” In simple terms, Cobalt Strike is a post-exploitation framework for adversary simulations and Red Teaming to help measure your security operations program and incident response capabilities. Cobalt Strike provides a post-exploitation agent, Beacon, and covert channels to emulate a quiet long-term embedded actor in a network.   If […]

Read More…

The post How to Extend Your Reach with Cobalt Strike  appeared first on Cobalt Strike Research and Development.

Continue reading How to Extend Your Reach with Cobalt Strike 

How to Extend Your Reach with Cobalt Strike 

We’re often asked, “what does Cobalt Strike do?” In simple terms, Cobalt Strike is a post-exploitation framework for adversary simulations and Red Teaming to help measure your security operations program and incident response capabilities. Cobalt Strike provides a post-exploitation agent, Beacon, and covert channels to emulate a quiet long-term embedded actor in a network.   If […]

Read More…

The post How to Extend Your Reach with Cobalt Strike  appeared first on Cobalt Strike Research and Development.

Continue reading How to Extend Your Reach with Cobalt Strike 

How do I select an automated red teaming solution for my business?

Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, but can automation simplify or even enhance the process? To select a suitable… Continue reading How do I select an automated red teaming solution for my business?

How purple team operations helped defend the Pentagon — and can help your security team today.

The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
The post How purple team operations helped defend the Pentagon — and can help your security team today. appea… Continue reading How purple team operations helped defend the Pentagon — and can help your security team today.

CredBandit (In memory BOF MiniDump) – Tool review – Part 1

One of the things I find fascinating about being on the Cobalt Strike team is the community. It is amazing to see how people overcome unique challenges and push the tool in directions never considered. I want explore this with CredBandit (https://github.com/xforcered/CredBandit). This tool has had updates since I started exploring. I’m specifically, looking at […]

Read More…

The post CredBandit (In memory BOF MiniDump) – Tool review – Part 1 appeared first on Cobalt Strike Research and Development.

Continue reading CredBandit (In memory BOF MiniDump) – Tool review – Part 1

A New Consultant’s 1st Con – Wild West Hackin Fest – Way West 2021

Last month, I found myself Googling: Is weed legal in Nevada?  This was the day after arriving in Reno for Wild West Hacking Fest – Way West 2021.  I kept noticing that the hotel smelled like it from the moment we arrived. I was attending one of the fi… Continue reading A New Consultant’s 1st Con – Wild West Hackin Fest – Way West 2021

Manage Cobalt Strike with Services

This post is part of a “Quality of Life” series, where tips and tricks will be shared to make using Cobalt Stike easier.  Cobalt Strike is a post-exploitation framework and requires customization to meet your specific needs. This flexibility is one of the most powerful features of Cobalt Strike. While this is great, some may […]

Read More…

The post Manage Cobalt Strike with Services appeared first on Cobalt Strike Research and Development.

Continue reading Manage Cobalt Strike with Services