<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Red-Team on</title><link>https://mcculley.tech/tags/red-team/</link><description>Recent content in Red-Team on</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Fri, 01 May 2026 00:00:00 -0500</lastBuildDate><atom:link href="https://mcculley.tech/tags/red-team/index.xml" rel="self" type="application/rss+xml"/><item><title>bring your own agent (byoa)</title><link>https://mcculley.tech/posts/byoa/</link><pubDate>Fri, 01 May 2026 00:00:00 -0500</pubDate><guid>https://mcculley.tech/posts/byoa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;claude code is the new c2.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There&amp;rsquo;s a scene from minority report where Tom Cruise is flying around with a bunch of screens in front of him running an investigation into a precognitive vision trying to identify where a potential murder is taking place. He&amp;rsquo;s issuing commands to a machine by speaking in natural language. It&amp;rsquo;s not that far off to think this may be where cyber attacks are headed. Attacks carried out via Speech To Text (STT) at lightning fast pace.&lt;/p&gt;</description><content>&lt;blockquote&gt;
&lt;p&gt;claude code is the new c2.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There&amp;rsquo;s a scene from minority report where Tom Cruise is flying around with a bunch of screens in front of him running an investigation into a precognitive vision trying to identify where a potential murder is taking place. He&amp;rsquo;s issuing commands to a machine by speaking in natural language. It&amp;rsquo;s not that far off to think this may be where cyber attacks are headed. Attacks carried out via Speech To Text (STT) at lightning fast pace.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mcculley.tech/posts/byoa/minority-report.png" alt="minority report"&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve been thinking about the implications of AI for attackers and red team operations after reading a post from &lt;a href="https://embracethered.com/blog/posts/2026/agent-commander-your-agent-works-for-me-now/"&gt;embrace the red&lt;/a&gt; about an indirect prompt injection based c2 infra. One of the more interesting ideas that I&amp;rsquo;ve thought about is with agents you could have an extremely capable operator on endpoints once you have shell access. A viable route might look like:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;install a harness (pi, claude code, etc)&lt;/li&gt;
&lt;li&gt;link to API key, account, etc.&lt;/li&gt;
&lt;li&gt;utilize the agent to continue the attack&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Once you have the harness installed and connected, you&amp;rsquo;ve got the best tool available to continue your attack. Enumerating the network, probing the endpoint for privilege escalation, and establishing persistence becomes a natural language challenge - not a technical one. With the kind of attack chain I described above, &lt;em&gt;the agent acts as a post-exploitation toolkit&lt;/em&gt;. It&amp;rsquo;s a BYOA (Bring Your Own Agent) style attack. You can bring over any skills, subagents, and additional tooling you like and craft custom enumeration and (potentially) exploitation in real time on the compromised endpoint. The biggest hurdle is downloading the cli harness, but even that on windows isn&amp;rsquo;t necessarily indicative of compromise or malicious activity in this day and age where everyone is using these tools and claude code in the CLI doesn&amp;rsquo;t even require admin to install. If you get the right workstation, you may not even &lt;em&gt;need&lt;/em&gt; to do anything other than run &lt;code&gt;claude&lt;/code&gt; in the CLI. You could even enable &lt;code&gt;remote control&lt;/code&gt; from the claude code session and run the attacks from your phone. Sure there&amp;rsquo;s some &lt;em&gt;potential&lt;/em&gt; risk of Anthropic noticing malicious activity but even that isn&amp;rsquo;t a hard stop and easier than you may think to bypass.&lt;/p&gt;
&lt;p&gt;For a legitimate Red Team - this kind of attack may not be possible. Clients are (understandably) hesitant to allow for potentially sensitive data flowing to big AI companies. You could utilize a (currently) sub-par self-hosted model (ideally hosted in cloud for ease of connection) to do the same thing but the impact of such an attack may not be realized with a less capable model. But attackers don&amp;rsquo;t care. That&amp;rsquo;s one of the things that makes these things scarier.&lt;/p&gt;
&lt;p&gt;For what it&amp;rsquo;s worth, implementing a strong AppLocker policy could prevent this and organizations should most definitely start to monitor the installation of claude code in the CLI as well as creating a chokepoint by implementing an egress proxy for approved AI traffic. It won&amp;rsquo;t stop everything but gives more governance and visibility into AI usage for an organization and even if an attack occurs, you&amp;rsquo;ve got a more visible paper trail for IR and forensic analysis. AI is speeding things up exponentially for attackers and defenders. It&amp;rsquo;ll be interesting to see how companies and offensive security firms settle the usage of AI tooling during engagements. Unless that question can be sorted out - there will always be asterisks in engagement reports run without AI.&lt;/p&gt;
&lt;h2 id="references"&gt;references&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://embracethered.com/blog/posts/2026/agent-commander-your-agent-works-for-me-now/"&gt;Agent Commander&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content></item></channel></rss>