../
cobaltstrike cheatsheet
Malleable C2:
Memory Permissions & CleanupBOF Memory Allocations- SPawnTo to Notepad
- Smb PIPE NAMES
- Amsi Disable CRTO
- sleep_mask
Kits:
Process Inject KitEvent Tracing For Windowsin aggressor script.Inline (.NET) Execution[–amsi –etw –appdomain SharedDomain –pipe dotnet-diagnostic-1337]Thread Stack Spoofing- Build
Sleep mask kit, follow along with module. - Mimikatz kit
OPPSEC:
- Use SpawnTo See below then ppid spoof
- argue
- Command line exclusions -
Process Creastions from PSExec & Wmi
EDR Evasion:
Process Mitigation Policy- blockdlls- list_process_callbacks
- zero_process_callback
IF REDIRECTOR BREAKS: sudo update-ca-certificates
- Powershell SpawnTo
spawnto x64 %windir%\sysnative\msiexec.exe
- ldap SpawnTo
spawnto x64 %windir%\sysnative\gpresult.exe
- dllhost SpawnTo
spawnto x64 %windir%\sysnative\dllhost.exe /Processid:{11111111-2222-3333-4444-555555555555}
- Mimikatz SpawnTo
spawnto x64 c:\windows\system32\mrt.exe