Blog Browser Pivoting (Get past two-factor auth) Several months ago, I was asked if I had a way to get past two-factor authentication on web applications. Criminals do it, but penetration testers
Blog Behind the Mask: Spoofing Call Stacks Dynamically with Timers This blog introduces a PoC technique for spoofing call stacks using timers. Prior to our implant sleeping, we can queue up timers to overwrite its
Blog Arsenal Kit Update: Thread Stack Spoofing As I mentioned in the recent Roadmap Update blog post, we are in the process of expanding the Cobalt Strike development team and ramping up
Blog A Quick Guide to Bug Reports One of the hardest parts of being a developer is working with bug reports and support requests disguised as bug reports. Some people write very
Blog A loader for Metasploit’s Meterpreter Recently, there was an interesting discussion on the metasploit-framework mailing list about the staging protocol for Meterpreter. egypt let loose with some wisdom about what
Blog A Deeper Look Into the Max Retry Strategy Option A complementary strategy to the Host Rotation Strategy was introduced to Cobalt Strike 4.5. The max retry strategy was added to HTTP, HTTPS, and DNS