BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Havoc framework is another open source alternative to Cobalt Strike

    Zscaler ThreatLabz security researchers are watching hackers move to a new open source command and control (C2, C&C) platform called Havoc as an alternative to Cobalt Strike.

    Among the most interesting features of Havoc is cross-platform: it bypasses Microsoft Defender on modern devices with Windows 11 using the Sleep obfuscation method, return address stack substitution, and indirect system calls.

    Like other exploit kits, Havoc includes a wide range of modules that allow pentesters and hackers to perform a variety of tasks on exploited devices, including:

    • execution of commands;
    • process management;
    • loading additional payload data;
    • manipulating Windows tokens;
    • shellcode execution.

    All this is done through a control panel that allows an attacker to see all compromised devices, events, and task outputs.

    Recently, in early January, an unknown threat group used this post-exploitation kit as part of a campaign against an unnamed government organization.

    The Zscaler ThreatLabz research team observed that the shellcode loader dropped on compromised systems disables event tracking for Windows (ETW), and the final Havoc Demon payload is loaded without the "DOS" and "NT" headers to avoid detection.

    The framework was also deployed using the malicious npm package "Aabquerys", whose name uses the Typosquatting method to imitate a legitimate module.

    “Demon.bin is a malicious agent with typical features of a RAT Trojan that was generated using Havoc. It supports the creation of malicious agents in several formats, including Windows PE executable, PE DLL, and shellcode.

    Cobalt Strike has become the most common tool for hackers to deliver additional payloads, but some cybercriminals have begun to look for alternatives to this tool as defenders have learned to better detect and prevent attacks.

    One alternative is Brute Ratel (BRc4), which is a complex set of tools "to avoid detection of EDR solutions and antivirus software." Created by Indian cybersecurity specialist Chetan Nayak, the BRc4 is an analogue of Cobalt Strike and is described as "a customizable command and control center for the Red Team and enemy emulation."

    Another free replacement for Cobalt Strike that has become very popular on the dark web is Sliver, a cross-platform, open-source Go-based penetration testing tool developed by security company BishopFox. C&C Server Sliver supports multiple protocols (DNS, HTTP/TLS, MTLS, TCP) and implant connection, and can host files that mimic a legitimate web server. Therefore, information security specialists can set up listeners to detect the Sliver infrastructure on the darknet.

    Author DeepWeb
    The Lazarus threat group uses the new WinorDLL64 backdoor to exfiltrate sensitive data
    Darknet Z-Library provides each user with a secret URL

    Comments 0

    Add comment