Module 14 Flashcards

(41 cards)

1
Q

What is the primary purpose of the adversary tactic known as ‘pivoting’?

A

Pivoting is used to proxy traffic in or out of a network, when it would normally be disallowed, using a compromised host (Beacon) as the pivot point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of pivoting reviewed in the source material?

A

The two types are SOCKS Proxies and Reverse Port Forwards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the term SOCKS stand for in the context of network protocols?

A

SOCKS is short for ‘SOCKet Secure’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a Cobalt Strike context, how does a SOCKS proxy function at a high level?

A

It exchanges network packets between an external adversary and internal machines via a proxy server, using a Beacon as the pivot point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Cobalt Strike command is used to start a SOCKS proxy on a specific port?

A

The ‘socks [port]’ command is used, for example, ‘socks 1080’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using a SOCKS proxy, what tool can be used on an adversary’s local machine to route traffic through the team server?

A

A proxying tool, such as proxychains, is configured to route traffic through the port listening on the team server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the Beacon’s sleep time affect the performance of a SOCKS proxy tunnel?

A

The lower the Beacon’s sleep time, the quicker the traffic can be tunneled, as the Beacon checks in more frequently to fetch tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is one advantage of using a SOCKS proxy for tooling in a Windows environment?

A

It allows the use of tools written in languages like Python that may not be readily available on the compromised Windows host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does tunneling tools via a SOCKS proxy reduce the detection surface?

A

It removes indicators from post-exploitation execution on the compromised host, leaving only the network traffic as evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Besides avoiding host-based detection, what is another key advantage of using SOCKS proxies for an attacker?

A

It allows the attacker to run GUI tools, such as RSAT, directly on their own machine to interact with the target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Proxifier and on which operating system does it run?

A

Proxifier is a tool that runs on Windows and forces TCP traffic from applications through a proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When configuring a proxy server profile in Proxifier for a Cobalt Strike SOCKS proxy, what IP address should be used?

A

The IP address of the team server should be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Proxifier, what is the best practice for configuring a proxification rule’s ‘Applications’ and ‘Target hosts’ fields?

A

Leave the applications field as ‘Any’ but specify the IP range of the target hosts to ensure only relevant traffic is proxied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two most common ways to authenticate to domain resources through a SOCKS proxy?

A

Authentication is most commonly done with plaintext credentials or Kerberos tickets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it necessary to add static host entries to the attacking machine when using Kerberos for authentication through a proxy?

A

It is necessary because Kerberos requires the use of hostnames rather than IP addresses for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which PowerShell cmdlet can be used to create a credential object from plaintext credentials for use with RSAT tools?

A

The ‘Get-Credential’ cmdlet is used to create a credential object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What tool can be used to leverage Kerberos tickets on an attacker’s Windows machine to authenticate through a proxy?

A

Rubeus can be used for Kerberos ticket manipulation.

18
Q

What is the purpose of the Rubeus createnetonly command in the context of SOCKS proxying?

A

It starts a new process with an injected Kerberos ticket, allowing tools run in that process to authenticate to the domain.

19
Q

After creating a new logon session with Rubeus, why must an attacker manually request service tickets?

A

The attacker must manually request them because they are not relying on the Windows OS to automatically handle ticket requests for the new session.

20
Q

What Rubeus command is used to request a service ticket for a specific service, such as LDAP?

A

The asktgs command is used to request a Ticket-Granting Service (TGS) ticket for a specific service.

21
Q

What Linux tool is functionally similar to Proxifier for forcing TCP traffic through a proxy?

A

The tool proxychains is used on Linux for this purpose.

22
Q

In the proxychains.conf file, which entry needs to be modified to point to the Cobalt Strike SOCKS proxy?

A

The default ‘socks4 127.0.0.1 9050’ entry must be replaced with the team server’s IP and the port specified in the ‘socks’ command.

23
Q

How would you execute nmap through a configured SOCKS proxy using the command line on Linux?

A

You would prefix the command with ‘proxychains’, for example: ‘proxychains nmap -n -sT -Pn -p 445 lon-dc-1’.

24
Q

Impacket tools on Linux can use Kerberos tickets, but they require the tickets to be in _____ format.

25
What script from the Impacket suite can convert Kerberos tickets from `.kirbi` to `.ccache` format?
The `ticketConverter.py` script is used for this conversion.
26
What environment variable must be set on a Linux system for Impacket to find and use a Kerberos ticket file?
The `KRB5CCNAME` environment variable must be set to the path of the `.ccache` ticket file.
27
When using Impacket with Kerberos tickets via proxychains, which three parameters replace the need for a plaintext password?
The `-no-pass`, `-k`, and `-dc-ip` parameters are used.
28
A reverse port forward is conceptually the _____ of a SOCKS proxy.
opposite
29
What is the primary function of a reverse port forward?
It allows an adversary to tunnel traffic out from an internal network, circumventing egress traffic restrictions.
30
What is a common scenario where a reverse port forward is particularly useful?
It is useful when you have remote command execution on a host that cannot access the internet to download a payload.
31
What is the syntax for the Cobalt Strike command to create a reverse port forward?
The syntax is `rportfwd [bind port] [forward host] [forward port]`.
32
In an `rportfwd` command, the _____ is the port the Beacon will listen on.
bind port
33
In an `rportfwd` command, the _____ and _____ are where the team server will forward the received traffic.
forward host; forward port
34
What is the biggest hurdle to setting up a reverse port forward on a compromised host?
The biggest hurdle is typically the inbound firewall rules on the host where Beacon is running, which block traffic by default.
35
What level of privilege is required to add an inbound firewall rule on a Windows host?
Local administrator access is required to add an inbound firewall rule.
36
What `netsh` command can be used to add a firewall rule allowing inbound TCP traffic on a specific port?
The command is `netsh advfirewall firewall add rule name="RuleName" dir=in action=allow protocol=TCP localport=[port]`.
37
In the reverse port forward example, traffic sent to `lon-wkstn-1:28190` is forwarded by the team server to `localhost:80`. What does `localhost` refer to in this context?
In this context, `localhost` refers to the team server itself, directing traffic to its own internal web server.
38
After successfully executing a command through a reverse port forward that hits the team server's web server, where can the corresponding log be found in Cobalt Strike?
The log can be found under View > Web Log.
39
What is the Cobalt Strike command to stop a specific reverse port forward?
The command is `rportfwd stop [bind port]`.
40
After a reverse port forward operation, what cleanup action should be performed regarding the firewall?
The firewall rule that was added to allow inbound traffic should be deleted.
41
What `netsh` command is used to delete a firewall rule by its name?
The command is `netsh advfirewall firewall delete rule name="RuleName"`.