Gibson> Download Garbage
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
      • O365 Tenant ID
      • Internal domain enumeration
      • O365 email enumeration
      • Passive nmap (smap)
      • Large IP list handling
      • Host Enumeration
    • Initial Access
      • Mail scanning
      • VBA
    • Execution
      • DLL Hijacking
      • Windows LOLBINS
        • DLLs - LOLBIN Execution
        • Executables - LOLBIN Execution
        • Scripts - LOLBIN Execution
    • Privilege Escalation
      • Windows
        • Initial Enumeration
      • Linux
    • Defense Evasion
      • Clear windows event logs
      • Bypassing proxies and firewalls
      • Microsoft Windows Defender
    • Credential Access
      • Extract credentials from LSASS dump
      • Extract credentials from registry hives
      • LSA secrets extraction
      • Dumping LSASS.exe
      • Dumping registry hives
      • Dump the domain (Domain Controllers)
      • Browser cookies & passwords
      • Wi-Fi passwords
      • Clipboard
    • Infrastructure
    • Web application testing
      • XSS - Cross site scripting
        • Weaponising XSS
    • Other
      • Buffer Overflow resources
        • Buffer Overflow Python Template
        • Buffer Overflow Python Fuzzer
      • C Reverse Shell
      • Creating Tiered Storage in Windows 10
      • Default Credentials
    • Red Team Infrastructure
      • Cobalt Strike Team Server
      • Pre-redirector (free domains!)
      • HTTPS Redirector
      • Multi functional WebApp
      • Malleable C2 profiles
      • Gophish Docker reverse proxy
    • Malware
  • Tools
    • Tools
Powered by GitBook
On this page

Was this helpful?

  1. Techniques
  2. Red Team Infrastructure

Cobalt Strike Team Server

Quick commands to set up a Cobalt Strike team server.

Firewall settings:

INBOUND
Allow all from lab IPs
Allow HTTP & HTTPS from HTTP(S) redirectors
Allow HTTP and DNS from DNS redirectors
Deny all 

As root on server:

apt update #update initial image
apt upgrade 

apt install openjdk-11-jdk #install OpenJDK Java environment
update-java-alternatives -s java-1.11.0-openjdk-amd64 #set Java environment 

#upload cobaltstrike binaries

tar xvzf /home/ubuntu/cobaltstrike-dist.tgz -C /root/  #extract to /root/cobaltstrike

cd /root/cobaltstrike/
./update #This can fail if not run from the correct directory 
#Enter licence key 
PreviousRed Team InfrastructureNextPre-redirector (free domains!)

Last updated 4 years ago

Was this helpful?