Maelstrom #4: Writing a C2 Implant: In this blog, we will discuss how to write a C2 implant for the modern era. We will look at the history of offensive techniques and the progress of defence. We then move into discussing some key concepts before finally writing stage 0, and the implant as a Reflective DLL.
Maelstrom #1: An Introduction: Throughout this series, we will be slowly building out a Command & Control Framework and discussing common implementation, IOCs, and TTPs. Whilst providing Offensive Teams with the information to get a rudimentary POC up and running, we also aim to provide as many detection mechanisms as possible.
Bluffy the AV Slayer: As an experiment, we converted default Cobalt Strike shellcode into various forms to see how it would do against static detection. Turns out, quite well. This post introduces a small tool we wrote to automatically mask shellcode in several different ways.