Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.

I spend a lot of time on the road in March and April—using my tools. During these months, I take careful notes of the usability issues I’d like to address and small tweaks that would make life better for Cobalt Strike’s hacker corps. Today’s Cobalt Strike release is the result of notes and my first-hand […]

Read More… from Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.

Cobalt Strike 03.13.14 – NECCDC Edition

I’m writing this from a New Hampshire Bed and Breakfast where I’ve apparently received the Jacuzzi suite. I’m here for a romantic weekend running psexec and managing Beacons inside of student networks for the North East Collegiate Cyber Defense Competition event. This is my seventh year with this event. I made a lot of development progress early into my […]

Read More… from Cobalt Strike 03.13.14 – NECCDC Edition

Man-in-the-Browser Session Hijacking

Malware like Zeus and its variants inject themselves into a user’s browser to steal banking information. This is a man-in-the-browser attack. So-called, because the attacker is injecting malware into the target’s browser. Man-in-the-browser malware uses two approaches to steal banking information. They either capture form data as it’s sent to a server. For example, malware […]

Read More… from Man-in-the-Browser Session Hijacking

Cobalt Strike 1.48 – Peer-to-peer C&C

I’m pleased to announce Cobalt Strike 1.48. This release introduces a peer-to-peer data channel for Beacon, improves browser pivoting, and updates the signed applet attack with options the latest Java 1.7 updates require. Peer-to-Peer Beacon It’s hard to stay hidden when many compromised systems call out to the internet. To solve this problem, Beacon now supports peer-to-peer command and […]

Read More… from Cobalt Strike 1.48 – Peer-to-peer C&C