This technique does not write any data to disk. Ĭommand and Scripting Interpreter: PowerShellĬobalt Strike can execute a payload on a remote host with PowerShell. Ĭobalt Strike can perform browser pivoting and inject into a user's browser to inherit cookies, authenticated HTTP sessions, and client SSL certificates.
#Cobalt strike beacon setup download
Ĭobalt Strike can download a hosted "beacon" payload using BITSAdmin. All protocols use their standard assigned ports. Ĭobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. Ĭobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS.
Ĭobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. Ĭobalt Strike can determine if the user on an infected machine is in the admin or domain admin group. Īccess Token Manipulation: Parent PID SpoofingĬobalt Strike can spawn processes with alternate PPIDs. Īccess Token Manipulation: Make and Impersonate TokenĬobalt Strike can make tokens from known credentials. Īccess Token Manipulation: Token Impersonation/TheftĬobalt Strike can steal access tokens from exiting processes. Ībuse Elevation Control Mechanism: Sudo and Sudo CachingĬobalt Strike can use sudo to run a command. Enterprise Layer download view Techniques Used DomainĪbuse Elevation Control Mechanism: Bypass User Account ControlĬobalt Strike can use a number of known techniques to bypass Windows UAC.