Linchakin

Registry-Recon - Cobalt Strike Aggressor Script That Performs System/AV/EDR Recon

 November 20, 2021     No comments   

Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon.

Author: Jess Hires

Description

As a red-team practitioner, we are often using tools that attempt to fingerprint details about a compromised system, preferably in the most stealthy way possible. Some of our usual tooling for this started getting flagged by EDR products, due to the use of Windows CLI commands. This aggressor script aims to solve that problem by only probing the system using native registry queries, no CLI commands.


Setup

Simply load reg.cna into Cobalt Strike using the Script Manager. Then right-click on the beacon you want to run registry recon on, and choose Registry then Recon, or type regenum into the beacon console.




How does this work?

Primarily, using Cobalt Strike's breg_query and breg_queryv functions. Then, all beacon output is hijacked with beacon_output, looking for specific values. When a positive match is made, the output will be highlighted in the beacon output. Since there is no beacon_output_reg or something similar, like beacon_output_ls and beacon_output_ps, all output must be captured for parsing.


What if my AV/EDR product isn't detected? / How can I help?

This is expected. We couldn't test for every AV/EDR solution, and we knew that many would be missing. You can help us out by submitting a GitHub issue including the following info:

  • If this is a System/AV/EDR entry
  • The name of the product
  • Relevant registry entries that can be used to positively ID the product

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • DDoS attacks in Q3 2021 News overview Q3 2021 brought two new DDoS attack vectors, potentially posing a serious threat, including for major web resources. A team of research… Read More
  • Kunyu - More Efficient Corporate Asset Collection Kunyu, More Efficient Corporate Asset Collection 0x00 Introduce Tool introduction Kunyu (kunyu), whose name is taken from , is actually a profession… Read More
  • The best Apple deals in November 2021: iPads, MacBooks and moreByBeren Neale 08 November 2021AppleWith early offers for the new 2021 iPads, iPhone 13 ...This is the best place to find the best Apple deals right now, whether you're looking for a new MacBook Pro or some AirPods Max. The truth is, Apple p… Read More
  • How to Survive Our Dystopian Future: A Practical List of Do's and Don'ts This article is for those who want to prepare their the quite-possibly-inevitable technocratic meltdown. Here are a few tech do’s and don’ts that wil… Read More
  • Debunking Coca-Cola's Most Popular Business Motivation Myth Here's one of the most heavily "exploited," and therefore, the most popular business motivational story. It goes without saying that you must have st… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates