Malware Devil

Sunday, March 21, 2021

Video: Finding Metasploit & Cobalt Strike URLs, (Sun, Mar 21st)

I have a couple of questions on my diary entry “Finding Metasploit & Cobalt Strike URLs“, thus I made a video that shows the method and explains in detail the checksum calculation.

I don’t use this method to go hunting (in proxy logs for example), as the checksum has a low-entropy, thus prone to collisions/false positives. But I do use this when I suspect the presence of Metasploit or Cobalt Strike traffic.

Cobalt Strike beacons often use HTTPS, but the URLs I talked about in my diary entry, are not the ones used by the beacon itself. These are the URLs of the staging shellcode, that precedes the beacon.

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Video: Finding Metasploit & Cobalt Strike URLs, (Sun, Mar 21st) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/21/video-finding-metasploit-cobalt-strike-urls-sun-mar-21st/?utm_source=rss&utm_medium=rss&utm_campaign=video-finding-metasploit-cobalt-strike-urls-sun-mar-21st

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...