Module 4 Flashcards

(66 cards)

1
Q

What is the primary function of the Cobalt Strike framework?

A

It provides a post-exploitation agent to simulate stealthy, long-term embedded actors in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main components of the Cobalt Strike framework?

A

Beacon, Team Server, and Client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Cobalt Strike, what is the ‘Beacon’ component?

A

Beacon is the post-exploitation agent that runs on a compromised endpoint, communicating with a team server to execute jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Beacon agent is implemented as a Windows DLL but can be packaged into various formats, including executables, PowerShell scripts, and _____.

A

position independent shellcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of the ‘Team Server’ in Cobalt Strike?

A

The team server is the central control and logging system that stores engagement information and manages Beacon communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What component do red team operators use to connect to team servers and interact with Beacon payloads?

A

The Client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the recommended design pattern for distributed operations in Cobalt Strike?

A

To stand up dedicated team servers for each phase of an engagement (e.g., initial access, post-exploitation, persistence).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why does Cobalt Strike recommend using separate team servers for different engagement phases?

A

If one part of an operation is discovered and blocked, other channels can be used to maintain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Cobalt Strike, what is a ‘listener’?

A

A listener defines the protocol and parameters by which a Beacon payload will communicate with the team server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five out-of-the-box communication protocols provided by Cobalt Strike listeners?

A

DNS, HTTP, HTTPS, SMB, and TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Listeners that communicate directly from the target environment to a team server are known as _____ listeners.

A

Egress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two Cobalt Strike protocols are examples of Egress listeners?

A

DNS and HTTP/S.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Beacon that does not communicate directly with the team server but routes traffic through another Beacon is called a _____ Beacon.

A

Peer-to-Peer (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two Cobalt Strike protocols are examples of Peer-to-Peer (P2P) listeners?

A

SMB and TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does an HTTP listener in Cobalt Strike typically communicate with the team server by default?

A

It uses HTTP GET requests to fetch tasks and HTTP POST requests to send back results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a ‘redirector’ in the context of Cobalt Strike’s HTTP listeners?

A

An intermediary host that sits between a Beacon and a team server, proxying traffic between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name two popular software choices that can act as redirectors for Cobalt Strike.

A

iptables, socat, Apache, or NGINX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In an HTTP listener with multiple hosts, which rotation strategy involves looping through the list, using each host for one request before moving to the next?

A

Round robin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the ‘failover’ host rotation strategy for an HTTP listener?

A

Beacon uses the same host until a specified failure condition (e.g., number of failed attempts) is met, then moves to the next.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the ‘rotate’ host rotation strategy for an HTTP listener?

A

Similar to round-robin, but each host is used for a specified time period before moving to the next.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the ‘Max retry strategy’ configure for a Beacon payload?

A

It configures Beacon’s self-destruct strategy if it completely loses its ability to communicate with all configured hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In the max retry strategy ‘exit-50-25-1h’, what does the number ‘25’ signify?

A

After 25 consecutive failed attempts, Beacon increases its sleep time to 1 hour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of the ‘HTTP host (stager)’ setting in a listener configuration?

A

It specifies the single host that a stager payload will use to fetch the full Beacon stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When would you set the ‘HTTP port (bind)’ to a different value than the ‘HTTP port (C2)’?

A

To perform port bending, where a redirector listens on the C2 port and forwards traffic to the team server on a different bind port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Setting the 'HTTP host header' in a listener configuration is a convenient way to leverage what technique without hardcoding it in a profile?
Domain fronting.
26
What is the purpose of the 'Guardrails' feature in Cobalt Strike payload generation?
It prevents stageless Beacon payloads from running unless specified criteria (e.g., IP address, username, hostname) have been met.
27
A DNS listener directs a Beacon to communicate with a team server via which types of DNS record lookups?
A, AAAA, or TXT record lookups.
28
What happens to the metadata of a new DNS Beacon when it first checks in?
The metadata is not sent until the Beacon is tasked with a job, causing it to initially appear as an 'empty' session.
29
What is the primary characteristic of an SMB listener regarding the team server?
It does not bind or listen on the team server; it only serves as a template for payload generation.
30
When an SMB Beacon payload is executed, what does it create on the compromised host?
It creates an SMB named pipe using the 'pipename' specified in the listener configuration.
31
By default, Cobalt Strike uses the pipe name _____ for SMB listeners, where ## are random hex values.
msagent_##
32
Like an SMB listener, a TCP listener does not direct the team server to listen on any ports; instead, it provides _____ for generating TCP Beacon payloads.
configuration information
33
In a TCP listener, what is the difference in binding if 'Bind to localhost only' is checked versus unchecked?
If unchecked, the Beacon binds to 0.0.0.0; if checked, it binds to 127.0.0.1.
34
A TCP listener that binds to 0.0.0.0 would typically be used for _____, while one that binds to 127.0.0.1 would be used for _____.
lateral movement; privilege escalation
35
Fundamentally, what type of file is a Cobalt Strike Beacon?
A Windows DLL.
36
Beacon is implemented as a _____ DLL, which allows it to be loaded into a process purely from memory rather than from disk.
reflective
37
The original Beacon reflective loader exports a function called _____ which, when called, maps a new copy of the DLL into memory.
ReflectiveLoader
38
In older Beacon versions, a small shellcode stub is written over the _____ to jump code execution to the exported ReflectiveLoader function.
DOS Header
39
Since Cobalt Strike 4.11, Beacon has used a new 'prepended' loader based on the one used by _____.
DoublePulsar
40
What is a key advantage of a 'prepended' loader over a 'stomped' loader?
It is more stealthy and flexible, can load any PE, and does not require the PE to export any specific functions for loading.
41
What is the purpose of 'payload staging' in attack frameworks?
To use a small program (stager) to fetch a larger, full payload (stage) over a different channel, bypassing exploit size limitations.
42
What security mechanism is embedded in every stageless payload to encrypt its metadata?
The team server's public key.
43
Why are stager payloads susceptible to hijacking when they are first executed?
They perform no validation to ensure they are communicating with a legitimate team server.
44
From an OPSEC perspective, why are stageless payloads considered better than stagers regarding memory allocation?
Stageless payloads avoid using RWX memory, allocating memory as RW first and then flipping it to RX before execution.
45
The HTML Application (.hta) payload generator can deliver a Beacon using which three methods?
Executable (on disk), PowerShell (in memory), and VBA (in memory via Office).
46
What type of Beacon architecture is always delivered by the HTML Application and MS Office macro payload generators?
An x86 Beacon payload.
47
The _____ payload generators in Cobalt Strike produce source code files, equivalent to Metasploit's msfvenom utility.
Stager/stageless
48
In a stageless payload configuration, what is the difference between the 'Process' and 'Thread' exit functions?
'Process' calls ExitProcess to terminate the entire process, while 'Thread' calls ExitThread to terminate only the Beacon's thread.
49
When should you use the 'xthread' (ExitThread) exit function for a Beacon payload?
When Beacon is injected into a process that is already running on a target system.
50
What are the two 'System Call' options for a stageless Beacon payload?
'Direct' (uses the Nt* version of a function) and 'Indirect' (jumps to an instruction within the Nt* version).
51
Besides a standard EXE, what are two other pre-built executable output options for Windows stageless payloads?
Windows Service EXE and Windows DLL.
52
In the Cobalt Strike session view, what does the 'external' IP address column represent?
The external IP address of the target, as resolved by the Cobalt Strike web server.
53
What does a red monitor icon with an asterisk next to the username signify in the Beacon session view?
The Beacon is running in high-integrity (local administrator or SYSTEM privileges).
54
A blue monitor icon in the Cobalt Strike session view indicates that the Beacon is running in _____ integrity.
medium
55
How does a Beacon prevent itself from being tasked by a different team server?
Its metadata is encrypted using the public key of the team server from which it was generated.
56
How do you open an interactive tab for a specific Beacon session?
Double-click on its row in the session view or right-click and select 'Interact'.
57
What command would you type in a Beacon console to see a list of available commands?
help
58
In the Beacon console, how do you get more detailed help for a specific command like 'getuid'?
help getuid
59
What does the log message '[+] host called home, sent: 8 bytes' indicate?
The Beacon has checked in, and the team server has sent it queued jobs to execute.
60
What is the main advantage of using the session graph view over the table view?
It makes the relationship between egress and P2P Beacons immediately obvious.
61
In the Cobalt Strike graph view, what does a dashed line represent?
An egress Beacon communicating directly with the team server.
62
What does a solid line between two Beacons in the graph view represent?
A Peer-to-Peer (P2P) connection.
63
In the session graph view, what color is used for HTTP/S egress traffic?
Dashed green.
64
In the session graph view, what does a solid yellow line indicate?
An SMB peer-to-peer connection.
65
What protocol is represented by a dashed yellow line in the session graph view?
DNS.
66
What does a solid green line between two Beacons in the graph view represent?
A TCP peer-to-peer connection.