You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Base64 obfuscation works well with PowerShell and sh executors, but it does not seem to work with the cmd executor.
When I checked the code, I found that the functions responsible for obfuscating commands are implemented specifically for psh and sh, but not for cmd.
To further investigate, I analyzed the network traffic and observed the HTTP requests between Caldera and the agent. For PowerShell, the command was obfuscated
Looks like your first issue -- we aim to respond to issues as quickly as possible. In the meantime, check out our documentation here: http://caldera.readthedocs.io/
@elegantmoose If you have an idea on how to achieve this, I'd be curious to know, as I couldn’t find a way myself.
What I did find involves using CMD to call PowerShell or a tool like certutil to decode the command first before executing it. However, my understanding of obfuscation is not about decoding and then executing the command, but rather executing a command that remains encoded throughout. If you decode first and then execute, the obfuscation becomes useless since the EDR will catch the command in plain-text.
The Base64 obfuscation works well with PowerShell and sh executors, but it does not seem to work with the cmd executor.
When I checked the code, I found that the functions responsible for obfuscating commands are implemented specifically for psh and sh, but not for cmd.
To further investigate, I analyzed the network traffic and observed the HTTP requests between Caldera and the agent. For PowerShell, the command was obfuscated
However, for cmd, the command was in plain text.
My questions are:
The text was updated successfully, but these errors were encountered: