Cyber Security Engineer at a tech services company with 51-200 employees
Real User
Top 20
2024-07-30T10:33:00Z
Jul 30, 2024
I use it a lot for independent research. I have a copy with me on my Kali box. There’s a good reason that it’s currently the best C2 in the market right now. It’s because of its versatility; you can modify it a lot and tamper with it. As a C2, it does its job extremely well. It can adapt to a lot of situations. You can write malleable C2 profiles in its own specific language named Aggressor Script, which is mostly used for threat emulation. Like, if you want to emulate a specific TTP, you write a specific C2 profile so that in your red team engagements, you can mimic an enemy adversary that you want to protect against. It uses a lot of industry-standard tools. For example, it can use Mimikatz very well. It integrates very well with other tools necessary for Red Team operations, like Mimikatz or Rubeus. You don’t have to upload the executable on the machine; it can run everything in memory. It has modules for all these tools I’ve mentioned.
Breach and Attack Simulation (BAS) tools are advanced security solutions that help organizations assess their cybersecurity posture by simulating potential attacks and breaches. They provide insights into vulnerabilities and measure the effectiveness of existing security measures. BAS solutions are designed to continuously test an organization's security systems by imitating the actions of attackers. By using real-world attack scenarios, BAS helps identify vulnerabilities in a controlled...
I use Cobalt Strike to emulate threat actor activities.
I use it a lot for independent research. I have a copy with me on my Kali box. There’s a good reason that it’s currently the best C2 in the market right now. It’s because of its versatility; you can modify it a lot and tamper with it. As a C2, it does its job extremely well. It can adapt to a lot of situations. You can write malleable C2 profiles in its own specific language named Aggressor Script, which is mostly used for threat emulation. Like, if you want to emulate a specific TTP, you write a specific C2 profile so that in your red team engagements, you can mimic an enemy adversary that you want to protect against. It uses a lot of industry-standard tools. For example, it can use Mimikatz very well. It integrates very well with other tools necessary for Red Team operations, like Mimikatz or Rubeus. You don’t have to upload the executable on the machine; it can run everything in memory. It has modules for all these tools I’ve mentioned.