Module 13 Flashcards

(36 cards)

1
Q

What is the primary goal of the ‘Lateral Movement’ tactic (TA0008)?

A

The adversary attempts to gain access to other computers on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lateral movement techniques in Cobalt Strike typically rely on legitimate remote management protocols using _____ credentials.

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two base primitives Cobalt Strike provides for executing commands on a target?

A

The jump and remote-exec commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the jump command in Cobalt Strike?

A

It is a one-stop-shop that automates all steps required to execute a new Beacon payload on a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the four automated steps performed by Cobalt Strike’s jump command.

A

It uploads a payload, remotely executes it, connects to the new session, and deletes the payload from the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the general syntax for the Cobalt Strike jump command?

A

The syntax is jump [exploit] [target] [listener].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Cobalt Strike jump technique uses a service to run a PowerShell one-liner?

A

The psexec_psh technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Cobalt Strike jump technique runs a PowerShell script via WinRM?

A

The winrm or winrm64 technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the remote-exec command in Cobalt Strike?

A

It provides a broader capability for executing remote commands, requiring the operator to perform individual steps for lateral movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the general syntax for the Cobalt Strike remote-exec command?

A

The syntax is remote-exec [method] [target] [command].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three remote execution methods available for the remote-exec command by default?

A

The methods are psexec, winrm, and wmi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the underlying protocol that the Windows Remote Management (WinRM) technique uses?

A

WinRM is Microsoft’s implementation of the WS-Management protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a major operational security advantage of using the WinRM lateral movement technique?

A

It executes a payload entirely within memory, without requiring it to be dropped to disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In what user context does a Beacon session established via WinRM run?

A

The Beacon runs in the context of the current or impersonated user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which default remote-exec method is the only one that returns command output?

A

The winrm method is the only one that returns output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The PsExec lateral movement technique is named after a tool from which software suite?

A

It is named after a tool from the Sysinternals Suite.

17
Q

What Windows component does the PsExec technique leverage to execute processes remotely?

A

It uses the Service Control Manager (SCM).

18
Q

By default, PsExec is the only built-in technique that performs remote _____.

19
Q

Describe the process the special service binary payload uses during a PsExec jump.

A

It spawns a new temporary process, injects Beacon shellcode into it, and then closes itself so the service can be deleted.

20
Q

In what user context will a Beacon executed via PsExec always run?

A

Beacons executed via PsExec will always run as SYSTEM.

21
Q

Why is the PsExec technique generally considered ‘loud’ from an OPSEC perspective?

A

New service creations are relatively rare events and are often monitored.

22
Q

How can Cobalt Strike’s jump and remote-exec commands be extended with custom techniques?

A

They can be extended via Aggressor Script.

23
Q

What is the SCShell project in the context of Cobalt Strike?

A

It is a custom lateral movement technique that implements a variation of PsExec.

24
Q

How does the SCShell technique differ from the default PsExec technique?

A

SCShell temporarily modifies an existing service to run a payload, whereas PsExec creates a new service.

25
How does an operator load a custom technique from a `.cna` file into Cobalt Strike?
Go to Cobalt Strike > Script Manager and load the `.cna` (Aggressor Script) file.
26
What does the acronym LOLBAS stand for?
Living Off The Land Binaries and Scripts.
27
What is the legitimate purpose of `MavInject.exe` on a Windows system?
It is a signed Microsoft executable that provides functionality for App-V to inject libraries into other processes.
28
What is the syntax for abusing `mavinject.exe` to inject an arbitrary DLL?
The syntax is `mavinject.exe [PID] /INJECTRUNNING [DLL PATH]`.
29
After finding a target process ID, what are the next three steps to achieve lateral movement with MavInject?
Upload the DLL payload, use `remote-exec` to run MavInject, and then `link` to the new Beacon.
30
What application control technologies can be used to block LOLBAS abuses outright?
Technologies such as AppLocker and WDAC can block LOLBAS abuses.
31
After moving laterally, why might a domain enumeration tool like PowerView fail?
This is a consequence of how different Windows logon types work, specifically the `Network` logon type.
32
What is the most important difference about the `Network` logon type concerning user credentials?
It is the only logon type discussed that does not leave the user's credentials (hash, TGT, etc.) in LSASS on the remote target.
33
Which two common Cobalt Strike lateral movement techniques result in a `Network` logon type on the target system?
Both WinRM and PsExec use the `Network` logon type.
34
Why does a `Network` logon prevent subsequent authentication to other resources, such as LDAP for domain enumeration?
Without the user's TGT cached in LSASS, the session cannot obtain new service tickets to authenticate to other resources.
35
What is the solution within Cobalt Strike to populate a new Beacon session with credentials, allowing it to authenticate to domain resources?
Leverage a user impersonation technique, such as `make_token` or `ptt`.
36
What is a tactical alternative to populating a new Beacon with credentials before running domain enumeration?
Perform the domain enumeration from another session that is already known to have credential material, like the one you jumped from.