by Kleiton Kurti | May 23, 2023 | Uncategorized
In this blog post, we will go through the importance of each profile’s option, and explore the differences between default and customized Malleable C2 profiles used in the Cobalt Strike framework. In doing so, we demonstrate how the Malleable C2 profile lends...
by WKL Marketing Team | May 15, 2023 | News
Steven Lawton published an article on Dark Reading that explores the potential risks of retired hardware and forgotten cloud virtual machines. A recent report revealed that 56% of decommissioned routers sold on the secondary market contained sensitive corporate...
by @Firestone65 | May 9, 2023 | Uncategorized
Introduction Phishing continues to be a lucrative vector for adversaries year after year. In 2022, for intrusions observed by Mandiant, phishing was the second most utilized vector for initial access. When Red Teaming against mature organizations with up-to-date and...
by Kleiton Kurti | May 2, 2023 | Uncategorized
This article is a demonstration of memory-based detection and evasion techniques. Whenever you build a Command & Control or you perform threat hunting, there will be scenarios when you might need to analyze the memory artifacts of a specific system—something that...