4.9 • 696 Ratings
🗓️ 8 November 2021
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, November 8, 2021 edition of the Sansonet Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.7 | Amazing diary this week from DDIH is showing you how to decrypt Cobalt strike traffic, but this time not using the leaked keys that |
0:26.3 | the DAA published about a week ago, but instead extracting keys from process memory. |
0:34.0 | So this assumes that you have a system that's currently infected with Cobalt Strike and you're trying to decrypt the traffic that Cobalt Strike sends back to its command control infrastructure. |
0:47.7 | Well, the next thing you need to decrypt it is you need the key and that can be found in memory. |
0:54.2 | Now, older versions of Cobalt Strike, you could pretty easily extract that key and |
1:00.5 | Didier in his usual fashion created a Python script to do that for you, but for some of the |
1:08.0 | newer versions of Cobalt Strike 4 and later, you do actually need some |
1:14.9 | encrypted network traffic to find the key. |
1:18.9 | And again, yet another little Python script here by DDE. |
1:24.3 | You feed it two packets that you collected off the network that were encrypted with |
1:29.6 | Cobalt Strike, and then it will use that data in order to extract the keys from memory. |
1:36.3 | So that's, well, all it takes in order to decrypt the traffic. A pretty neat technique, |
1:43.3 | and thanks, DDA, again again for publishing all these Python scripts |
1:47.3 | that make this process while, of course, there are a lot of moving parts, reasonably straightforward. |
1:56.1 | Well, while DDA's post is probably more interesting for those of you who are using network |
2:00.5 | forensics. |
2:01.5 | We do have a second post this weekend by Tom. |
2:04.5 | Tom is talking quickly about a tool called Xmount. |
2:08.4 | Nice thing about Xmount is that allows you to convert various disk image formats that are commonly |
2:15.4 | used in forensics and also convert them then into formats |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.