You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Sep 14, 2023. It is now read-only.
I was a little confused with the "sandcat.exe" binary. It is in C:\users\public\sandcat.exe as shown below:
and this is because when I ran the PowerShell command, it downloaded it there:
However, I believe the script believes it is on the path where the session is running from? Maybe?. However, as you can see below, I ran the powershell script from the users pgustavo default path. I dont know if this makes sense? 😆
Does it make sense to update the script and set it to point to C:\users\public\sandcat.exe since it is the default location for when it is downloaded? or I can just download the payload and run it from wherever I want? You guys have this in the WIki Step 1 began with a legitimate user executing the payload on the victim host.. I believe that maybe an additional comment can be added to the WIKI to be very specific on why you need to download it rather than using the other options available in Caldera for initial access? Maybe?. Just sharing some thoughts and my initial test 👍 . I am so happy the other other steps worked perfectly fine and I was able to collect the data generated by each step 😉 .
Thank you in advance!
The text was updated successfully, but these errors were encountered:
Good evening,
this issue goes along with:
because they are from the same setup and operation execution (APT3 - Full)
When I got to 5.B.1 - Access Token Manipulation (T1134), 6.A.1 - Query Registry (T1012), 7.B.1 - Remote File Copy (T1105), 7.C.1 - Scheduled Tasks (T1053), 8.A.1/2 - File and Directory Discovery (T1083) I got the following message:
I was a little confused with the "sandcat.exe" binary. It is in C:\users\public\sandcat.exe as shown below:
and this is because when I ran the PowerShell command, it downloaded it there:
However, I believe the script believes it is on the path where the session is running from? Maybe?. However, as you can see below, I ran the powershell script from the users pgustavo default path. I dont know if this makes sense? 😆
Does it make sense to update the script and set it to point to C:\users\public\sandcat.exe since it is the default location for when it is downloaded? or I can just download the payload and run it from wherever I want? You guys have this in the WIki
Step 1 began with a legitimate user executing the payload on the victim host.
. I believe that maybe an additional comment can be added to the WIKI to be very specific on why you need to download it rather than using the other options available in Caldera for initial access? Maybe?. Just sharing some thoughts and my initial test 👍 . I am so happy the other other steps worked perfectly fine and I was able to collect the data generated by each step 😉 .Thank you in advance!
The text was updated successfully, but these errors were encountered: