Closed gkshakthi15 closed 2 years ago
Looks like your first issue -- we aim to respond to issues as quickly as possible. In the meantime, check out our documentation here: http://caldera.readthedocs.io/
Does each payload execution is limited to specific TTPs?
This issue is stale because it has been open 20 days with no activity. Remove stale label or comment or this will be closed in 5 days
Hello all,
I am trying to perform DLL Injection - Adversary Emulation using Caldera. The command leverages odbcconf.exe and registers sandcat.dll to registry. Also, I am attaching a payload (187e67_calc.cpl) which should open Calculator application when the command is executed.
However, I neither could see the sandcat.dll file in C:\Users\ and calc is not opened but the Operation status shows "success".
Also, the command works only with executor "psh", cmd is not working.
Could anyone explain what's happening?