Presented at
Texas Cyber Summit 2019,
Oct. 11, 2019, 1 p.m.
(120 minutes).
In the age of EDR products, Red Teamer's need to be able to customize everything on the fly - stock
Command and Control (C2) frameworks and agents quickly become insufficient. Why stop at simple
obfuscation or name changes for customization though? Red Teamer's can leverage operational data to
track artifacts created on target, create callback hierarchies, and even map operations to MITRE
ATT&CK. In this workshop, we'll present two C2 frameworks designed with customization and
collaboration in mind - Apfell and Covenant.
Students will navigate a series of labs to illustrate the advantages and use cases for when to use Apfell
and Covenant over other frameworks while in a simulated Active Directory enterprise environment. They
should expect to be able to install, customize, and leverage these frameworks within operational
environments when they get back to the office.
Workshop Outline (outline of teaching topics)
* Intro to Apfell
* Overview of lab scenario
* Discuss install (but don't do it live)
* Walk-through the lab, highlighting the following:
* changing/tracking command modifications on the fly
* Customized c2 traffic
* Using modules (how it integrates with other tools people might use for macos/*nix, loading in safety checks/AD queries)
* How to add a new command
* How to add a new payload type/c2 profile
* Reporting (artifacts and otherwise)
Presenters:
-
Ryan Cobb
- SpecterOps
Ryan Cobb is an operator and red teamer at SpecterOps, who specializes in building offensive security
toolsets. Ryan has contributed to several open source security projects, such as Empire and Invoke-
Obfuscation, and is the author of PSAmsi, SharpSploit, and Covenant. Ryan has presented at several
security conferences, including: DerbyCon, BSides Austin, and BSides DFW. Ryan maintains a blog at
cobbr.io where he shares research and development projects.
-
Cody Thomas
- SpecterOps
Cody Thomas is a red team operator and developer focusing on macOS and *nix devices. He created the
initial Mac and Linux ATT&CK matrices while he was working on the Adversary Emulation team at
MITRE. Cody has spoken at a few conferences and works on his open source framework for macOS Red
Teaming called Apfell. He maintains his blog at its-a-feature.github.io.
Links:
Similar Presentations: