New blog series on how threat actors abuse Cobalt Strike. This first part explains how to analyze, decode and parse Cobalt Strike payloads.
Follow us in our journey analyzing Mongolian certificate authority breach and certificate client backdoored with Cobalt Strike.