Movatterモバイル変換


[0]ホーム

URL:


emailinfo@BC-Security.org

BC SecurityBC Security

searchmenuContact Us

Blog

Background
shareclose

Offensive Security ToolsHubbl3

Operator’s Field Guide to Offensive IronPython

Note: This blog is quite technical and I wanted it to be a quick, concise reference for TTPs. If you find the text explanations to be a bit dense, I ...

Offensive Security ToolsCx01N

Not Your Grandfather’s Empire

Not Your Grandfather’s Empire I’ve wanted to put this blog together since returning home from DEFCON. Anytime we ran into someone who recognized our swag, they mentioned how much they ...

Cyber SecurityHubbl3

ScriptBlock Smuggling: Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching

Note: All code samples shown in the post can be found in our repo here  In recent years, PowerShell tradecraft has seen a drop in popularity among pentesters, red teams, ...

Cyber SecurityHubbl3

Bridging the Gap: Applying Systems Engineering to Organizational Cyber Risk Management 

Recently, while discussing cyber risk management with a customer, they made the observation that there is a lot of training for top-level risk management in the shape of things like  ...

Cyber SecurityHubbl3

Survivorship Bias and How Red Teams Can Handle It

Reporting is, by nature, only the threat actors that have been caught. What about all the ones that didn’t get caught? There is no way to examine that and It ...

Cyber SecurityHubbl3

Ransomware during a Pentest, Yes or No?

NOTE: Some of the topics in this article are probably going to be a bit contentious, but part of the hope in publishing this article is to drive some additional ...

Offensive Security ToolsVincent Rose

Empire / Starkiller – New Year 2024

We recently released Empire 5.8 and Starkiller 2.7. Sometimes, we forget to highlight the cool new features or changes as they release. So, in addition to covering the Empire 5.8 ...

Offensive Security ToolsVincent Rose

Get Organized with Starkiller’s Tagging Feature

Forget about feeling overwhelmed with a mess of data. With tags in Starkiller, you have more control over keeping everything organized. You can assign tags to various objects – Listeners, ...

Cyber SecurityCx01N

The Evolution of Covert Communication: From Domain Fronting to PaaS Redirectors

In cybersecurity, techniques evolve rapidly as defenders and attackers adapt to the ever-changing landscape. This article will explore an exemplary example of this evolution in transitioning from Domain Fronting to ...

Cyber SecurityCx01N

Empire 5.2 Release

We recently rolled out Empire 5.2 to our public repo! This latest version brings a host of new features, enhancements, and bug fixes to further streamline your experience. Let’s dive ...

Offensive Security ToolsVincent Rose

Introducing Empire 5.0 / Starkiller 2.0

The original goal of Empire 5.0 was to only introduce a better v2 REST API to deal with some shortcomings of the original API found while building Starkiller and the ...

ProgrammingVincent Rose

Using GitHub Actions to manage CI/CD for Empire

We’ve been using GitHub actions for Empire and Starkiller for quite some time now. It’s been a significant productivity boost for our releases because we manage multiple versions of the ...

Cyber SecurityCx01N

Why Most Red Teams are Really Pentesters

Something that we have seen increasingly often on Twitter recently is people ostensibly posting about “Red Teams” and how if they did what APT X did, all their colleagues would ...

Offensive Security ToolsCx01N

Empire<3 MSFvenom

Today we wanted to cover one of the lesser-known functions in Empire, the ReverseShell stager. The name may not be as intuitive, so standby for a future name change, but ...

Cyber SecurityHubbl3

Maldocs Are Evolving

Unless you have been living under an infosec rock the past couple of weeks, you probably heard about the Follina exploit, which allows attackers to achieve remote code execution via ...

UncategorizedCx01N

Empire 4.5

It has been another exciting week for the team. First we are just a week away for our inaugural course for Advanced Threat Emulation: Evasion. Second, we were able to ...

Cyber SecurityCx01N

Empire 4.4

It has been a while since we have been able to discuss the new features in Empire. We wanted to take some time to discuss some upgrades under the hood ...

Cyber SecurityCx01N

Weaponizing WebDAV for Offensive Security

Today, we will talk about combining two fascinating Tactics, Techniques, and Procedures (TTPs) together for deploying Command and Control (C2): IronPython and WebDAV. If you read our previous blog post ...

Cyber SecurityCx01N

Rebuilding IronNetInjector – Turla’s IronPython Toolkit

During a recent engagement, we were asked to employ Turla’s Tactics, Techniques, and Procedures (TTPs) using IronNetInjector. This is not a toolkit that we had a lot of experience with ...

Cyber SecurityCx01N

Empire 4.2

Empire 4.2 was just finalized over the weekend and we are excited to share some of the new features. This version has added some new capabilities to keep our threat ...

Cyber SecurityCx01N

Hacktoberfest 2021

It’s that time of year again! This means it’s the season for Halloween, Oktoberfest, and HACKTOBERFEST! So what is Hacktoberfest? Hacktoberfest is a yearly event that encourages participation in the ...

Offensive Security ToolsCx01N

Hooks, Filters, and Other Really, Really, Cool Things

In case you don’t check our commit history on our GitHub on a daily basis, Empire 4.1 and Starkiller 1.9 were released to Kali and Sponsors this week! This release has some much-needed quality of life ...

Offensive Security ToolsCx01N

Community Contributors Program

Are you an infosec developer, blogger, Blue Teamer, or general misfit and want to contribute to the Empire? Well, here’s your chance! We are opening the doors a bit to ...

Cyber SecurityHubbl3

XLS Entanglement

VBA tradecraft is constantly evolving and this past winter, I came across some articles from Adepts of 0xCC. Specifically, their article Hacking in an Epistolary Way: Implementing Kerberoast in Pure ...

Cyber SecurityCx01N

Overview of Empire 4.0 and C#

The release of Empire 4.0 is just around the corner and we wanted to take some time to walkthrough some of its new features. So what is Empire 4.0? It ...

Offensive Security ToolsCx01N

Empire Dropbox C2 Listener

One of the lesser-known features in Empire is the ability to use alternative Command and Control (C2) methods. Specifically, we can leverage the Dropbox API as a C2 channel, which ...

Offensive Security ToolsVincent Rose

Empire 3.7 and Starkiller 1.6

Last week we announced a new partnership with Kali for Starkiller and Empire. You can read up more about that in our previous post. The purpose of this post is ...

Cyber SecurityVincent Rose

Kali and BC Security Partnership

Beginning January, we will be granting Kali users and Sponsors 30-day exclusive early access to Empire and Starkiller before the code gets publicly released to our repositories, you can check ...

Offensive Security ToolsCx01N

Return of the CLI

The new Empire CLI is out and includes some big changes to the user experience. We rebuilt the CLI to interact with the Empire team server through the API. These ...

Cyber SecurityCx01N

Overview Of Empire 3.4 Features

Its been about 2-weeks since we released Empire 3.4, and hopefully, everyone has had a chance to check out all the new features. Our team has put quite a few ...

Offensive Security ToolsCx01N

Empire: Malleable C2 Profiles

Empire 3.4.0 is our next major release and is packed with one of the most advanced features to-date, Malleable C2. The Malleable C2 Listener gives control to operators to customize ...

Cyber SecurityHubbl3

PowerShell Logging: Obfuscation and Some New(ish) Bypasses Part 1

While giving our talk at the DEF CON Red Team Village a couple of weeks ago, I previewed a PowerShell ScriptBlock logging obfuscation technique. I have been working on it ...

Cyber SecurityHubbl3

PowerShell Logging: Obfuscation and Some New(ish) Bypasses Part 2

This entry will focus on the obfuscation of the PowerShell Script in the ScriptBlock log and Transcription log. First, there will be a little more discussion on a module log ...

Cyber SecurityHubbl3

Random SMTP Fun with Telnet

You may remember the good ole days where you can connect to pretty much any mail server (like Gmail) with telnet and spoof emails to your friends from whoever you ...

Cyber SecurityHubbl3

Reflective PE Injection in Windows 10 1909

Last month we taught our DEF CON 27 workshop, Introduction to Sandbox Evasion and AMSI Bypasses, as a webinar. It went really well, but the primary focus of the course ...

Offensive Security ToolsCx01N

Using the OneDrive Listener in Empire 3.1.3

As part of the Empire 3.1.3 update, we fixed the OneDrive listener and added documentation for easier configuration.

Offensive Security ToolsCx01N

An Introduction to Starkiller

Starkiller represents a huge step forward for red teams trying to operate together on engagements.

Cyber SecurityCx01N

An Introduction To Offensive Security

Going back to our Offensive Security definition, red teams and pentesters are attempting to validate that an organization’s systems.

Offensive Security ToolsCx01N

The Empire (3.0) Strikes Back

There are a lot of significant changes to Empire, so we thought it would be a good idea to walk through them in a little more detail.

Offensive Security ToolsCx01N

JA3/S Signatures and How to Avoid Them

JA3/S signature evasion has become a popular Indicator of Compromise(IOC) and has been incorporated into everything from Splunk to…

Wireless SecurityCx01N

How to Break into a Jeep When You Don’t Have A Knife

Hacking Jeeps is nothing new in the media, but we wanted to give it a try and see how difficult it is for ourselves. So we dug out our SDRs, ...

Cyber SecurityCx01N

I Think You Have the Wrong Number: Using Errant Callbacks to Enumerate and Evade Outlook’s Sandbox

We experienced an unexpected callback to our C2 server while sending a malicious file to an Outlook account.

Cyber SecurityCx01N

Empire Was Great Again…For a Week

BC Security found that the August 12/13 definitions update for Windows does not flag Empire or identify Mimikatz.

COPYRIGHT 2020 - BC SECURITY


[8]ページ先頭

©2009-2025 Movatter.jp