Cisco AMP – Bypassing Self-Protection
Oct 26th, 2018
Written by: Admin
ActiveBreach
Sometimes when you are in the middle of an engagement, you will come across a hurdle which requires a quick bit of research, coding, and a little bit of luck….
Oct 26th, 2018
Written by: Admin
ActiveBreach
Sometimes when you are in the middle of an engagement, you will come across a hurdle which requires a quick bit of research, coding, and a little bit of luck….
Sep 27th, 2018
Written by: Admin
ActiveBreach
Constrained Language Mode is a method of restricting PowerShell’s access to functionality such as Add-Type, or many of the reflective methods which can be used to leverage the PowerShell runtime…
Sep 10th, 2018
Written by: Admin
ActiveBreach
During a red team engagement, it is often beneficial to have the ability to quickly and programatically deploy infrastructure. To date, most existing literature has focussed on deploying the server…
Aug 20th, 2018
Written by: Admin
ActiveBreach
System Integrity Protection (sometimes called “rootless”) is a security feature introduced in OS X El Capitan as a way to protect critical system components from all accounts, including the root…
Aug 13th, 2018
Written by: Admin
ActiveBreach
Recently we’ve been looking at MacOS in the context of redteaming, looking at endpoint security products and how they can be evaded on a Mac. I have previously explored Windows…
Aug 2nd, 2018
Written by: Admin
ActiveBreach
You’ve completed your recon, and found that your target is using MacOS… what next? With the increased popularity of MacOS in the enterprise, we are often finding that having phishing…
Jun 25th, 2018
Written by: Admin
ActiveBreach
In April, we released our in-house payload generation tool SharpShooter to demonstrate the automation of some of the nuances in payload creation and evasion of defensive controls. This was generally…
Jun 18th, 2018
Written by: Admin
ActiveBreach
By now, many of us know that during an engagement, AMSI (Antimalware Scripting Interface) can be used to trip up PowerShell scripts in an operators arsenal. Attempt to IEX Invoke-Mimikatz…
Mar 7th, 2018
Written by: Admin
ActiveBreach
Getting a foothold is often one of the most complex and time-consuming aspects of an adversary simulation. We typically find much of our effort is spent creating and testing payloads…
Feb 9th, 2018
Written by: Admin
ActiveBreach
Last week, it was reported that an exploit was being used to spread the ROKRAT malware. What made this so interesting is that Flash was being used by an APT…