Cobalt Strike
Overview
Malleable C2 Profiles
Reflective Shellcode Loaders
Domain Enumeration
Domain SMB Share Enumeration
Miscellaneous Remote Workstation/Server stuff
Local Privilege Escalation
PowerUp - PowerSploit module
SharpUp - .NET port of PowerUp
WinPEAS - Windows Privilege Escalation Awesome Script
SeatBelt - .NET tool by GhostPack
Watson - .NET version of Sherlock.ps1 to look for missing KBs on Windows
PrintNightmare priv esc exploit (CVE-2021-3452)
HiveNightmare priv esc SAM dump (CVE-2021–36934)
Stealing logon tokens
Elevating to SYSTEM Beacon
Lateral Movement
Domain Privilege Escalation
GPP Passwords
LAPS Passwords
Password spraying
Kerberoasting
AS-REP Roasting
Coercion attacks
Defense Evasion
Shellcode injection techniques
AMSI patch
ETW patch
API Unhooking
Exploitation
DPAPI decryption and extraction on Windows systems
SharpWeb - Retrieve saved credentials in Chrome, Firefox and Edge
Active Directory Certificate Services (AD CS) Attack
MalSCCM - Exploiting SCCM servers to deploy malicious applications
Exfiltration - Password Attacks
Dumping LSASS locally (all commands below require local Admin)
SAM database dump
SharpSecDump SAM and LSA extraction
NTDS.dit dump (all commands below require Domain Admin privileges!)
Credential Prompt
Exfiltration - Email
Persistence
Cobalt Strike BOFs
References
Last updated