ARTi-C2 Post Exploitation Framework

ARTi C2
ARTi-C2

Atomic Red Team Intelligence C2


ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET’s DLR.

DESCRIPTION

ARTi-C2 is a modern execution framework built to empower security teams to scale attack scenario execution from single and multi-breach point targets with the intent to produce actionable attack intelligence that improves the effectiveness security products and incident response.

PHILOSOPHY

Blackbot Labs believes in creating tools where vendor solutions and open source can be provisioned and managed together by all organizations with the intent to deliver actionable attack intelligence organizations can use to define clear objectives and drive strategic security program initiatives.

Commitment

  • INTEGRITY We develop tools and frameworks that produce accurate attack intelligence to help security teams evaluate the integrity of their security solutions.
  • TRANSPARENCY We work under the umbrella of full transparency during all phases of tool and framework development. From striking up ideas with our community to enhancing the capabilities of tools used by red teams all over the world; if Blackbot Labs is brewing up a new tool or framework, you’ll know about it.
  • AGILITY We take pride in enabling lean security teams to remain agile and focused on developing a unique trade-craft that’s agnostic to certain tools developed by the red team community. Whether the focus is to keep tight margins between mean time to detect (MTTD) metrics and mean time to respond (MTTR) metrics or evaluating security control effectiveness, Blackbot Labs will always build tools and frameworks to help cut through the noise and eliminate the gray areas of targetted attacks and practical testing applications.
  • SCALABILITY Scaling operational activities is critical to sustaining efficient security ecosystem workflows in modern-day environments. If our tools don’t help you scale your operational capabilities, let us know and we’ll fix it.
  • FLEXIBILITY Blackbot Labs builds and delivers open source tools with the flexibility and intent for security professionals to improve their trade-craft and scale security testing initiatives in IT, OT, cloud-native and hybrid workspaces.
  • RAPID DEPLOYMENT Facilitating rapid deployment models is important to us. We’ll do our best to deliver practical deployment frameworks that facilitate advanced security eco-systems and data-driven pipelines.

CAPABILITIES

ARTi-C2 Core features and capabilities are sourced from SILENTTRINITY and atomic tests executed through Boo are from ATOMIC-RED-TEAM. All other feature enhancements were built to ensure operational trade-craft, agility, scalability, and rapid execution is not compromised.

CAPABILITYDESCRIPTION
Rapid DeploymentAutomate and scale testing efforts from single and multi-target breach points located in different regional environments
Modern Command & ControlImplant and Server Comms: Uses the power of SILENTRINITY’s ECDHE Encrypted C2 Communication capabilities to encrypt all C2 traffic. Implant management capabilities allow security teams to use multi-channel communication techniques mapped to MITRE ATT&CK.
Client and Server Comms: Uses Asyncio and WebSockets are used by a modern CLI powered by prompt-toolkit. Notable features include: – Implant location tagging NGROK integration
Standard Execution HeaderAutomate and scale testing efforts from single and multi-target breach points located in different regional environments
JSON Logging SupportStreamline, ingest, decode, and analyze evidence with your ELK stack or any Analytics platform ready to parse JSON.
Stageless in Memory Code ExecutionSend a single web request to a callback URL and observe the stager dynamically compile, check-in, evaluate, and execute tasks in the jobs queue. Continuously execute Atomic Red Team tests in real-time.
Modular Payload Development– Boo using reflective DLL injection to invoke Powershell’s run-time environment
– Boo using reflective DLL injection to invoke system calls and CMD
Dynamic Attack FormationsDynamically form and execute attack-chains in real-time without the need to recompile or restart ARTi-C2. As of today, ARTiC2 supports 3 differnt attack functions:
– Attack Chains:
– Attack Profiles:
– Attack Scenarios:
Modular Payload DeliveryARTi-C2 leverages SILENTRINITY’s framework to deliver Red Team Atomic tests “As is” through the following dynamically compiled payload deliver controllers:
– unmanaged powershell
– stageless powershell
Operational ManagementJob IDs are included for controller execution and evidence collection. They’re great for event analysis and evidence correlation.

MITRE ATT&CK COVERAGE – [MITRE ATT&CK Coverage Map](https://attack.blackbot.io) – Have questions? Join the Blackbot community on Slack at [https://attackintelligence.slack.com](https://blackbotlab.slack.com) – Connect with us and signup via Slack. [Slack Signup Page](https://join.slack.com/t/blackbotlab/signup)

USE CASES

  • SOCs need to evaluate and improve EDR solutions in minutes
  • Organizations are evaluating different EDR/AV solutions for Windows OS
  • Organizations need to simulate APT group tactics, techniques, and procedures without the need to go ‘ALL IN” on research and planning.
  • Organizations need to know if their assets are protected against common attacks from disk and memory
  • Organizations need to execute lightweight test cases mapped to MITRE ATT&CK and prove their assets are protected
  • Organizations need to benchmark critical risk profiles against the ATT&CK framework before releasing systems to Corp IT/production
  • Organizations need to simulate ransomware tactics without introducing risk in order to develop specific detection and prevention capabilities
  • Organizations are required to keep tight margins between mean time to detect (MTTD) and mean time to respond (MTTR) metrics can demonstrate improvement
  • Organizations need to continually improve SOAR workbooks
  • Organizations need to evaluate system risk profiles across departments with thousands of systems. We recommend testing one and deploying the risk profile configuration settings based on your organizations’ policy/system deployment orchestration framework.

DOCUMENTATION NOTES:

  • In progress. Best to connect with us on slack.

GET INVOLVED

Write atomic test cases for the folks at Red Canary and we’ll take care of the test. Join the Blackbot Community Today!

CODE OF CONDUCT

Blackbot Lab operates under the umbrella of full transparency while ensuring end-user privacy remains a top priority. For more details on how we operate with our community, visit our community page.