Staging/Stagers

Stagers are used to: keep payload smalls, appear non malicious, and avoid detection. This will keep things nice and simple and will reduce the complexity of our payloads. Here are a list of stages, and their purpose:

STAGE 0

  • Also known as Droppers and Loaders

  • Burnable and ready to adapt to new methods

  • Used for Initial payload delivery

  • Detecting defenses such as security products and application whitelisting

  • Used for bypassing such defenses like application whitelisting and amsi

  • facilitate transfer into the other stages

STAGE 1

  • This is used for persistence and such

  • Used for situational awareness and information gathering

  • Will be the long term beacon

  • Will usually have robust communication, and will be very stable

STAGE 2

  • This is where the fun starts

  • Privilege escalation

  • lateral movement

  • Network enumeration

  • AD attacks and credential access

STAGE 3

  • The exfiltration phase

  • Find and extract sensitive data

  • encrypt traffic, uses traffic tunneling

Last updated