Module 7 Flashcards

(62 cards)

1
Q

What is the primary goal of the post-exploitation phase in a red team engagement?

A

To hunt down the operational objective by locating it, identifying who has access, and executing a plan to gain access without being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List three examples of tactics, techniques, and procedures (TTPs) used during the post-exploitation phase.

A

Local/domain reconnaissance, privilege escalation, credential dumping, user impersonation, and lateral movement are all common post-exploitation TTPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In post-exploitation, what is the term for assessing the machine you have access to and its environment?

A

Situational awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Beacon command behavior category includes commands that only change or return values stored within Beacon’s memory?

A

House-Keeping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The _____ command behavior category in Cobalt Strike includes the most benign commands that only call Windows APIs.

A

API-Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The cd, cp, ls, ps, and pwd commands are all examples of what Beacon command behavior category?

A

API-Only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Beacon Object File (BOF)?

A

A BOF is a C program compiled without a linker that can be loaded and executed in memory by a Beacon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary disadvantage of using a BOF for inline execution in Beacon?

A

If the code inside the BOF crashes, the Beacon process will die along with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The _____ execution pattern involves spawning a temporary process and injecting a reflective DLL into it, with output read over a named pipe.

A

Fork & Run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main trade-off of using the ‘Fork & Run’ execution pattern compared to inline execution?

A

It provides better stability for Beacon but at the expense of a larger detection surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two ‘flavors’ of the Fork & Run execution pattern in Cobalt Strike?

A

The two flavors are ‘spawn’ and ‘explicit’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the ‘spawn’ variant of Fork & Run differ from the ‘explicit’ variant?

A

The ‘spawn’ variant creates a new temporary process for injection, while the ‘explicit’ variant injects into a process that already exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two arguments in a Beacon command’s help text indicate it supports the ‘explicit’ Fork & Run variant?

A

The presence of [pid] and [arch] arguments indicates support for the ‘explicit’ variant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The execute-assembly and powerpick commands are examples of which Fork & Run variant?

A

The ‘spawn’ variant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The psinject command is an example of which Fork & Run variant?

A

The ‘explicit’ variant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Cobalt Strike command injects a reflective VNC DLL to gain remote control of a user’s desktop?

A

The desktop command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does the VNC session initiated by the desktop command tunnel its traffic back to the team server?

A

It creates a reverse port forward on the target which the VNC DLL uses to tunnel traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the default interaction mode for a VNC session started with the desktop command?

A

The session is in ‘view only’ mode by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which Beacon command executes a given command using cmd.exe /c on the target?

A

The shell command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which Beacon command executes a target program directly without using cmd.exe?

A

The run command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why does the command dir only work with the shell command and not the run command?

A

Because dir is a command that exists only within cmd.exe and is not a separate program on disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

For better OPSEC, what API-only command should be used as an alternative to shell dir?

A

The ls command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

For better OPSEC, what API-only command should be used as an alternative to shell whoami?

A

The getuid command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which Beacon command executes PowerShell by invoking powershell.exe?

A

The powershell command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which Beacon command uses Unmanaged PowerShell by spawning a new process and injecting a DLL into it?
The `powerpick` command.
26
Which Beacon command injects an Unmanaged PowerShell DLL into an existing process specified by a PID?
The `psinject` command.
27
What is the purpose of the `powershell-import` command in Cobalt Strike?
It imports a local PowerShell script, making its cmdlets available for use with the `powershell`, `powerpick`, and `psinject` commands.
28
What is the maximum number of PowerShell scripts that can be held by Beacon using `powershell-import` at one time?
Beacon can only hold one imported script at a time.
29
Which Beacon command is used to execute a .NET assembly from memory?
The `execute-assembly` command.
30
What type of .NET assemblies are supported by the `execute-assembly` command?
Only .NET Framework assemblies are supported; .NET/.NET Core assemblies are not.
31
What command is used to execute a Beacon Object File (BOF) directly?
The `inline-execute` command.
32
What is the term for the technique of spawning new Beacon sessions from existing ones?
Session passing.
33
What Beacon command spawns a new process and injects shellcode for a listener, running as the same user?
The `spawn` command.
34
What Beacon command spawns a payload as an alternate user by accepting plaintext credentials?
The `spawnas` command.
35
Why might the `spawnas` command fail with error code 267 (`ERROR_DIRECTORY`)?
This can be caused by Beacon's current working directory being set to a location the alternate user cannot access.
36
What is the simple fix for a `spawnas` failure caused by an inaccessible working directory?
Change Beacon's working directory to a location the target user can read, such as `C:\`.
37
Which Beacon command is used to list files and directories in the current or a specified directory?
The `ls` command.
38
Which Beacon command is used to change the Beacon's current working directory?
The `cd` command.
39
Which Beacon command is used to see if a machine has any additional mapped drives?
The `drives` command.
40
In the Cobalt Strike File Browser, what does it mean if a directory is greyed out?
It means the directory has not yet been viewed.
41
The speed at which files can be downloaded from a target depends on the C2 channel's protocol and the Beacon's _____.
sleep time
42
Where do files downloaded from a target initially get stored?
They are downloaded to the team server first.
43
How does an operator transfer a downloaded file from the team server to their local machine?
By navigating to View > Downloads, selecting the file, and clicking 'Sync Files'.
44
Which command shows a summary of file downloads that are still in progress?
The `downloads` command.
45
Which command is used to terminate a file download that is in progress?
The `cancel [filename]` command.
46
What Beacon command is used to list running processes on the target system?
The `ps` command.
47
What privilege level must a Beacon be running at to read the architecture, session, and user information for all processes?
The Beacon must be running in high-integrity.
48
What is the function of the `keylogger` command in Cobalt Strike?
It injects a keystroke logger into a process to capture key presses made by the user who owns that process.
49
The `keylogger` runs as a long-term task. What command is used to view its Job ID (JID)?
The `jobs` command.
50
How do you terminate a running keylogger job in Cobalt Strike?
First, use the `jobs` command to find its JID, then use `jobkill [JID]` to stop it.
51
Where is the output from the `keylogger` command viewed?
The output is sent to a dedicated tab accessed via View > Keystrokes.
52
What command is used to read the text content of a user's clipboard on the target machine?
The `clipboard` command.
53
Which command is used to list all subkeys and values within a given registry path?
The `reg query` command.
54
Which command is used to read the value of a single, specific registry key?
The `reg queryv` command.
55
Which screenshot command in Beacon works by forcing a PrintScr keypress and grabbing the image from the user's clipboard?
The `printscreen` command.
56
Which screenshot command in Beacon uses a post-exploitation DLL to grab the screen content without using the clipboard?
The `screenshot` command.
57
What is the purpose of the `screenwatch` command?
It provides a way to take continuous screenshots of the user's desktop automatically.
58
The frequency of screenshots taken by the `screenwatch` command is tied directly to the Beacon's _____ time.
sleep
59
Where in the Cobalt Strike client are screenshots from `printscreen`, `screenshot`, and `screenwatch` viewed?
They are sent to a dedicated tab that can be accessed via View > Screenshots.
60
In the context of Cobalt Strike command behavior, what does Inline Execution refer to?
The execution of a Beacon Object File (BOF) within the memory space of the Beacon process itself.
61
Which command provides a useful way to run PowerShell scripts in the context of another user, assuming sufficient privileges?
The `psinject` command, by injecting into a process owned by that user.
62
What is the underlying project that the `powerpick` and `psinject` commands are based on?
They are based on Lee Christensen’s UnmanagedPowerShell project.