blog.nviso.eu/2021/10/21/cobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1

Preview meta tags from the blog.nviso.eu website.

Linked Hostnames

37

Thumbnail

Search Engine Appearance

Google

https://blog.nviso.eu/2021/10/21/cobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1

Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1

We found 6 private keys for rogue Cobalt Strike software, enabling C2 network traffic decryption. The communication between a Cobalt Strike beacon (client) and a Cobalt Strike team server (C2) is encrypted with AES (even when it takes place over HTTPS). The AES key is generated by the beacon, and communicated to the C2 using…



Bing

Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1

https://blog.nviso.eu/2021/10/21/cobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1

We found 6 private keys for rogue Cobalt Strike software, enabling C2 network traffic decryption. The communication between a Cobalt Strike beacon (client) and a Cobalt Strike team server (C2) is encrypted with AES (even when it takes place over HTTPS). The AES key is generated by the beacon, and communicated to the C2 using…



DuckDuckGo

https://blog.nviso.eu/2021/10/21/cobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1

Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1

We found 6 private keys for rogue Cobalt Strike software, enabling C2 network traffic decryption. The communication between a Cobalt Strike beacon (client) and a Cobalt Strike team server (C2) is encrypted with AES (even when it takes place over HTTPS). The AES key is generated by the beacon, and communicated to the C2 using…

  • General Meta Tags

    9
    • title
      Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1 – NVISO Labs
    • charset
      UTF-8
    • viewport
      width=device-width, initial-scale=1
    • robots
      max-image-preview:large
    • description
      We found 6 private keys for rogue Cobalt Strike software, enabling C2 network traffic decryption. The communication between a Cobalt Strike beacon (client) and a Cobalt Strike team server (C2) is encrypted with AES (even when it takes place over HTTPS). The AES key is generated by the beacon, and communicated to the C2 using…
  • Open Graph Meta Tags

    10
    • og:type
      article
    • og:title
      Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1
    • og:url
      https://blog.nviso.eu/2021/10/21/cobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1/
    • og:description
      We found 6 private keys for rogue Cobalt Strike software, enabling C2 network traffic decryption. The communication between a Cobalt Strike beacon (client) and a Cobalt Strike team server (C2) is e…
    • og:site_name
      NVISO Labs
  • Twitter Meta Tags

    3
    • twitter:text:title
      Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1
    • twitter:image
      https://blog.nviso.eu/wp-content/uploads/2021/10/20211010-173109.png?w=640
    • twitter:card
      summary_large_image
  • Link Tags

    29
    • EditURI
      https://blog.nviso.eu/xmlrpc.php?rsd
    • alternate
      https://blog.nviso.eu/feed/
    • alternate
      https://blog.nviso.eu/comments/feed/
    • alternate
      https://blog.nviso.eu/2021/10/21/cobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1/feed/
    • alternate
      https://blog.nviso.eu/wp-json/wp/v2/posts/8782

Emails

4
  • [email protected]
  • ?subject=%5BShared%20Post%5D%20Cobalt%20Strike%3A%20Using%20Known%20Private%20Keys%20To%20Decrypt%20Traffic%20-%20Part%201&body=https%3A%2F%2Fblog.nviso.eu%2F2021%2F10%2F21%2Fcobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1%2F&share=email
  • [email protected]
  • [email protected]

Links

74