Get to Know Cobalt Strike: New Introductory Training

We’re excited to announce the launch of a brand-new Cobalt Strike training course, created in collaboration between Fortra and Zero-Point Security. This unique partnership brings together the expertise of Cobalt Strike’s team with the field-tested training experience of Zero-Point Security to deliver an unmatched learning opportunity. Through this course users can learn how to use […]

Read More… from Get to Know Cobalt Strike: New Introductory Training

Artificial Intelligence for Post-Exploitation

Post-exploitation tasks frequently require manual analysis, such as relying on an operators’ expertise to scan a target environment for sensitive information that could support in the pursuit of an objective. For example, searching file shares and internal applications for sensitive information of credentials. These tasks are often time consuming, but can be dramatically improved with […]

Read More… from Artificial Intelligence for Post-Exploitation

Dynamically Instrumenting Beacon With BeaconGate – For All Your Call Stack Spoofing Needs!

TL;DR: In this blog we’ll demonstrate how to instrument Beacon via BeaconGate and walk through our implementations of return address spoofing, indirect syscalls, and a call stack spoofing technique, Draugr, that are now available in Sleepmask-VS. Furthermore, we’ll provide tips and tricks for developers in getting set up with Sleepmask-VS so they can write their […]

Read More… from Dynamically Instrumenting Beacon With BeaconGate – For All Your Call Stack Spoofing Needs!

Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….

Cobalt Strike 4.11 is now available. This release introduces a novel Sleepmask, a novel process injection technique, new out-of-the-box obfuscation options for Beacon, asynchronous BOFs, and a DNS over HTTPS (DoH) Beacon. Additionally, we have overhauled Beacon’s reflective loader and there are numerous QoL updates. Out-of-the-Box Evasion Overhaul The focus of this release (and the […]

Read More… from Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….

Update: Stopping Cybercriminals from Abusing Cobalt Strike

Since 2023, Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC) have been working together to combat the use of unauthorized, legacy copies of Cobalt Strike and compromised Microsoft software, which have been weaponized by cybercriminals to deploy ransomware  and other malware, causing significant harm to critical sectors like […]

Read More… from Update: Stopping Cybercriminals from Abusing Cobalt Strike

Revisiting the UDRL Part 3: Beacon User Data

The UDRL and the Sleepmask are key components of Cobalt Strike’s evasion strategy, yet historically they have not worked well together. For example, prior to CS 4.10, Beacon statically calculated its location in memory using a combination of its base address and its section table. This calculation was then modified depending on the contents of […]

Read More… from Revisiting the UDRL Part 3: Beacon User Data