../
cobaltstrike cheatsheet
Malleable C2:
Memory Permissions & Cleanup
BOF Memory Allocations
- SPawnTo to Notepad
- Smb PIPE NAMES
- Amsi Disable CRTO
- sleep_mask
Kits:
Process Inject Kit
Event Tracing For Windows
in aggressor script.Inline (.NET) Execution
[–amsi –etw –appdomain SharedDomain –pipe dotnet-diagnostic-1337]Thread Stack Spoofing
- Build
Sleep mask kit
, follow along with module. - Mimikatz kit
OPPSEC:
- Use SpawnTo See below then ppid spoof
- argue
- Command line exclusions -
Process Creastions from PSExec & Wmi
EDR Evasion:
Process Mitigation Policy
- blockdlls- list_process_callbacks
- zero_process_callback
IF REDIRECTOR BREAKS: sudo update-ca-certificates
- Powershell SpawnTo
spawnto x64 %windir%\sysnative\msiexec.exe
- ldap SpawnTo
spawnto x64 %windir%\sysnative\gpresult.exe
- dllhost SpawnTo
spawnto x64 %windir%\sysnative\dllhost.exe /Processid:{11111111-2222-3333-4444-555555555555}
- Mimikatz SpawnTo
spawnto x64 c:\windows\system32\mrt.exe