{"title":"双用途工具钴击靶系统的工作原理及检测","authors":"A. V. Khaver","doi":"10.31673/2409-7292.2023.020002","DOIUrl":null,"url":null,"abstract":"The article investigates the nature of the functioning of the dual-purpose tool Cobalt Strike, which actively uses APT (Advanced Persistent Threat) in its arsenal primarily to gain unauthorized access to information systems and their information assets. Considering the extent of the widespread use of Cobalt Strike, it is advisable to consider the principle of its operation and possible measures to counter its penetration into the information systems of objects of critical information infrastructure.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Principles of operation and detection on the target system of the dual purpose tool Cobalt Strike\",\"authors\":\"A. V. Khaver\",\"doi\":\"10.31673/2409-7292.2023.020002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article investigates the nature of the functioning of the dual-purpose tool Cobalt Strike, which actively uses APT (Advanced Persistent Threat) in its arsenal primarily to gain unauthorized access to information systems and their information assets. Considering the extent of the widespread use of Cobalt Strike, it is advisable to consider the principle of its operation and possible measures to counter its penetration into the information systems of objects of critical information infrastructure.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2023.020002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2023.020002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Principles of operation and detection on the target system of the dual purpose tool Cobalt Strike
The article investigates the nature of the functioning of the dual-purpose tool Cobalt Strike, which actively uses APT (Advanced Persistent Threat) in its arsenal primarily to gain unauthorized access to information systems and their information assets. Considering the extent of the widespread use of Cobalt Strike, it is advisable to consider the principle of its operation and possible measures to counter its penetration into the information systems of objects of critical information infrastructure.