6/28/2023 0 Comments How to install cobalt strike![]() Lateral Movement: Many system pipes allow for remote code execution. ![]() Privilege Escalation: The Potato family being the most frequent recently, but even Metasploit’s “Get-System” uses Named Pipes. Modulated Implants: Communicating between malicious children processes back to the implant core, often utilized with Key Loggers. Named Pipes have worked their way into a lot of common malicious behaviour, especially with: Named Pipes have been something that I’ve thought about for a while, especially how do we take advantage of them during active compromise. If you haven’t read it, I highly recommend it. Recently I stumbled across svch0st’s “ Guide to Named Pipes and Hunting for Cobalt Strike Pipes”. Happy Holidays! This weeks update is a bit of a shorter blog, mostly to keep me busy while on Christmas holidays!
0 Comments
Leave a Reply. |