Announcement

Collapse
No announcement yet.

Demo Labs - Starkiller

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Demo Labs - Starkiller


    Target Audience: Offense, Defense

    Short Abstract:
    The ultimate goal for any security team is to increase resiliency within an organization and adapt to the modern threat. Starkiller aims to provide red teams with a platform to emulate Advanced Persistent Threat (APT) tactics. Starkiller is a frontend for the post-exploitation framework, PowerShell Empire, which incorporates a multi-user GUI application that interfaces with a remote Command and Control (C2) server. Empire is powered by Python 3 and PowerShell and includes many widely used offensive security tools for Windows, Linux, and macOS exploitation. The framework's flexibility to easily incorporate new modules allows for a single solution for red team operations. Both red and blue teams can utilize Starkiller to emulate and defend against the most used APT attack vectors.

    Detailed Explanation of Tool:
    Starkiller is a cross-platform UI available in Linux, Windows, and macOS thanks to the power of ElectronJS for interacting with the Empire post-exploitation framework. Starkiller enables a red team to share any instance of Empire during an engagement for instant collaboration and efficient event tracking. All tasks are tracked in a master database which can be queried to track progress and generate post-engagement reports.

    Short Developer Bio:
    Vincent "Vinnybod" Rose is a software engineer with experience in cloud services. He has a decade of experience in software development and networking. Recently, his focus has been on building ad-serving technologies, web and server-side applications. He is the lead developer for Starkiller, the graphical user interface for the Empire framework.
    PGP key: dtangent@defcon.org valid 2020 Jan 15, to 2024 Jan 01 Fingerprint: BC5B CD9A C609 1B6B CD81 9636 D7C6 E96C FE66 156A
Working...
X