RT-3022 Alternative C2 Frameworks Part 2 - Covenant

Presented at Texas Cyber Summit 2019, Oct. 12, 2019, 1 p.m. (120 minutes).

In the age of EDR products, Red Teamers need to be able to customize everything on the fly - stock Command and Control (C2) frameworks and agents quickly become insufficient. Why stop at simple obfuscation or name changes for customization though? Red Teamers can leverage operational data to track artifacts created on target, create callback hierarchies, and even map operations to MITRE ATT&CK. In this workshop, we'll present two C2 frameworks designed with customizability and collaboration in mind - Apfell and Covenant. Students will navigate a series of labs to illustrate the advantages and use cases for when to use Apfell and Covenant over other frameworks while in a simulated Active Directory enterprise environment. They should expect to be able to install, customize, and leverage these frameworks within operational environments when they get back to the office. ​ Workshop Outline (outline of teaching topics) * Intro to Covenant * Overview of lab scenario * Discuss install (but don't do it live) * Walk through lab, highlighting the following: * Changing something on the fly * Customized C2 traffic * Using modules (how it integrates with other tools people might use now, like powershell scripts or other .net programs) * How to add a new module * Lateral movement (and intro to smb c2) * Reporting (artifacts and otherwise)

Presenters:

  • Ryan Cobb - SpecterOps
    Ryan Cobb is an operator and red teamer at SpecterOps, who specializes in building offensive security toolsets. Ryan has contributed to several open source security projects, such as Empire and Invoke- Obfuscation, and is the author of PSAmsi, SharpSploit, and Covenant. Ryan has presented at several security conferences, including: DerbyCon, BSides Austin, and BSides DFW. Ryan maintains a blog at cobbr.io where he shares research and development projects.
  • Cody Thomas - SpecterOps
    Cody Thomas is a red team operator and developer focusing on macOS and *nix devices. He created the initial Mac and Linux ATT&CK matrices while he was working on the Adversary Emulation team at MITRE. Cody has spoken at a few conferences and works on his open source framework for macOS Red Teaming called Apfell. He maintains his blog at its-a-feature.github.io.

Links:

Similar Presentations: