- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- C2
- Actions on Objective
Malleable C2 profiles - what is?
- .NET C2 Framework
- focused on .NET attack surface
- web interface
- multi-platform
- Docker container option
- developed in C#
- Recon: Includes Powerview
- Privesc: PowerUp
- Persistence
- Antivirus Bypass
- Extract hases
- Extract Plainttext Psswords
- Extract Kerberos Tickets
- PTH
- Build Golden Tickets
- Collection of python written tools for network protocols
- Capabilities include:
- Remote execution
- Kerberos
- Credential Extraction
- MITM