CRITICALSTART’s TEAMARES Launches DeimosC2
Flexible, Open-Source Tool to Manage Post-Exploitation Issues – Without the Extra Spend
PLANO, TX – July 23, 2020 – TEAMARES, theoffensive security and incident response arm ofCRITICALSTART, a leading provider of Managed Detection and Response (MDR) services, today announced the launch of DeimosC2, addressing the market need for a cross-compatible, open-source Command and Control (C2) tool for managing compromised machines that includes mobile support.
Offensive security teams often need access to a cost-effective, easy-to-use tool that can manage compromised machines after exploitation. However, many of the options currently available in the market can be difficult to use, expensive, or lack the flexibility to expand features. With this in mind, TEAMARES developed DeimosC2, a cross-platform and collaborative tool designed with robust functionality that can be extended in any language. Teams can conduct post-exploitation on any major operating system (OS), including Android devices, addressing the lack of defensive capabilities that are available on enterprise devices.
DeimosC2 features include:
- A UI that offers ease of use and supports multiple users for collaboration.
- Multiple listener and agent communication methods such as TCP, HTTPS, DNS over HTTPS (DoH), and QUIC.
- Pivot capabilities over TCP.
- Extendable functionality that can be written in multiple languages.
- API over WebSockets allowing for scriptable functionality.
- Written in Golang for cross-compatibility on all major operating systems.
- Archive and replay functionality post-testing so users can restore listeners, loot, and other critical information to the database.
“Red teams usually have to choose between expensive C2 tools in the market or training for their teams on the current tools,” said Quentin Rhoads-Herrera, director of professional services for TEAMARES and co-author of DeimosC2. “Deimos is an open-source, community-contributed tool that is designed for ease of use and cross-OS compatibility without a large spend of budget or time.”
Visit us at deimosc2.com to learn more.
- Consumer Education(39)
- Consumer Stories(2)
- Cybersecurity Consulting(10)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(9)
- MDR Services(64)
- Penetration Testing(16)
- Press Release(59)
- Research Report(9)
- Security Assessments(16)
- Thought Leadership(17)
- Threat Hunting(9)
- Vulnerability Disclosure(3)