

Cobalt Strike 3.0 supports the SMB Beacon with visualization that shows this chaining in a beautiful and intuitive way. This effectively allows you to chain Beacons to tightly control your communication path and egress systems/elevated processes through another Beacon’s channel. This Beacon variant uses a named pipe to receive commands from and send output through a parent Beacon. The SMB Beacon is a first-class part of Cobalt Strike’s workflows.

Cobalt Strike 3.0’s reports produce detailed timelines of red team activity and indicators of compromise. Actions and output are captured whether a client is connected to the server or not. File uploads are hashed and the file hash is noted in the logs.

Each command is attributed to an operator. All logging now takes place on the team server. Logging and Reporting were completely overhauled. Logging and Reporting Designed for Red Team Operations This release includes features and workflows for user-exploitation at scale and a data model that populates itself with credentials and targets found with Beacon. Here are the highlights… Asynchronous Post Exploitation with Beaconīeacon has completed its transition from stable lifeline to full-featured post-exploitation agent. This release makes several strategic changes to support Cobalt Strike’s Red Team Operations and Adversary Simulation use cases. Cobalt Strike 3.0 is a stand-alone platform for Adversary Simulations and Red Team Operations. Notably, Cobalt Strike no longer directly depends on the Metasploit Framework. Cobalt Strike 3.0 is the next iteration of this.Ĭobalt Strike 3.0 is a ground-up rewrite of the client and server components in this product. I’ve executed on this since the product’s 2012 release. Cobalt Strike’s mission is to help security professionals emulate “advanced threat tactics” during their engagements.
