Cobalt Strike
How to set up the Team Server
#Start the teamserver and run as service
Intrusionz3r0@htb[/crto]$ tmux
Intrusionz3r0@htb[/crto]$ cd cobaltstrike
Intrusionz3r0@htb[/crto]$ sudo ./teamserver <Attacker-Box> <Password-TeamServer> c2-profiles/normal/webbug.profile#Set parameters:
Alias: Kali-Intrusionz3r0
Host: <Attacker-Box>
Port: Defaul Port
Username: Intrusionz3r0
Password: <Password-TeamServer>Running team server as service to start automatically
Intrusionz3r0@htb[/crto]$ sudo nano /etc/systemd/system/teamserver.service[Unit]
Description=Cobalt Strike Team Server
After=network.target
StartLimitIntervalSec=0
[Service]
Type=simple
Restart=always
RestartSec=1
User=root
WorkingDirectory=/home/attacker/cobaltstrike
ExecStart=/home/attacker/cobaltstrike/teamserver <Attacker-Box> <Password-TeamServer> c2-profiles/normal/webbug.profile
[Install]
WantedBy=multi-user.targetSetting up DNS records for DNS based beacon payloads

Cobalt Functionalities
Listeners
How to Set Up an Listener:

Setting up a listener proxy aware (beacon)

Setting up the SMB Listener

Pivot Listeners

Set up a Script web delivery

Hosting a file

Session passing
Cobalt Strike kits (extensions)
Cobalt Strike useful commands
Notes for CRTO
External Reconnaissance
Gaining Initial foothold
Simple Macro for MS Word
Advanced Macro for MS Word
Internal Enumeration
EDR / (AV)
SIEM
Another tools
Host Persistence
Hijacking COM objects

Script to detect CLSID with Powershell
Host Privilege Escalation
UAC Bypass
Credential Theft
Domain Reconnaissance
User impersonation
Pass the hash
Pass the ticket
Over pass the hash
Stealing tokens
Token store
Making tokens
Injecting arbitrary shellcode into a process
Lateral movement
Data Protection API
Kerberos
Kerberoast
Asreproast
Constrained delegation enabled
Resource Based Constrained delegation RBCD
Useful ticket combinations
Technique
Required Service Tickets
Silver Ticket
Golden Ticket
Kerberos Relay
Setting up Cobalt Strike
Kerberos Relay + RBCD attack workflow
Kerberos Relay Attack using Shadow Credentials
Shadow Credentials
NTLM Relay

WebClient Abuse (WebDAV)
Pivoting
Set up Socks Proxy on cobalt strike
Active Directory Certificate Services
How to exploit ESC1 - ESC13
ADCS - ESC1
ADCS - ESC8
Golden Certificate
GPO Abuse
Modify Existing GPO
MSSQL
System Center Configuration Manager (SCCM)
Forest & Domain Trusts
Bidireccional Trust
Inbound trust
Outbound trust
Defense Evasion
AV/Bypass
Applocker
Manual AMSI bypass
One line AMSI bypass
Remote AMSI bypass
Last updated
