Defending

Defending

8 bookmarks
Custom sorting
EchoTrail
EchoTrail
Endpoint Behavioral Insights for Security Analysts and IT Professionals. Search our Insights database for filenames and hashes to see how Windows processes behave in the wild.
·echotrail.io·
EchoTrail
Cobalt Strike Staging and Extracting Configuration Information
Cobalt Strike Staging and Extracting Configuration Information
This post covers how Cobalt Strike staging works, how to replicate a staging request to obtain beacon shellcode, and then how to extract the Cobalt Strike config from the shellcode.
·blog.securehat.co.uk·
Cobalt Strike Staging and Extracting Configuration Information