You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Brainstorm on the possibility to launch plain text command on implant. Inspire yourself with Caldera -> stockpile/app/obfuscators/plain_text
Now, the implant retrieve the command in plain-text and obfuscates in base64. We need to raise the obfuscation at the OpenBAS platform level and give the obfuscate command directly to the implant (save in db the plain command + the obfuscation command ? ).
Don't forget to use this obfscuquer command in the inject_expectations_signature.
Add obfuscator at the inject level.
The payload can be defined and then we can change obfuscator on the fly when we are using it.
EllynBsc
changed the title
Add obfuscator option to technical inject/ payload
Ability to choose an obfuscator for your technical inject to avoid detection
Nov 22, 2024
Use case
Add obfuscator option to technical inject/ payload in order to avoid detection.
Crowdstrike detect everything in base 64.
We want to be able to choose an obfuscator for your technical inject to avoid detection:
The text was updated successfully, but these errors were encountered: