6/14/2023 0 Comments Cobalt strike beacon![]() ![]() ![]() ![]() Malleable C2 lets you change your network indicators to look like different malware each time. This allowed (and still allows) red teams to conduct an incredibly advanced and wide-ranging attack scenario that wasn’t possible-or as easy-prior to Cobalt Strike.Ĭobalt Strike’s parent company, HelpSystems, describes the product’s intention and capabilities on their website: “Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer’s network. It quickly gained popularity in the community because of its full suite of functionality from payloads and exploitation to command & control. Its purpose was to help these teams become more advanced in their work to conduct intrusions where they were allowed to carry out an authorized cyber attack on their company or in a consultative role. It was created in 2012 with the intention of aiding pentesters and red teams. The commercially available adversary emulation software called Cobalt Strike is a perfect example. Throughout history there are many examples of inventions created with good intentions (and maybe still are used for the right purposes) but when in the wrong hands, are used for something more malicious than their original intent.
0 Comments
Leave a Reply. |