Agent connection

Interact with an agent using Control Pack

Once Control Pack receives a connection from an agent, you will hear an audible alert to let you know a new agent is online. At the same time, the agent will appear under Current Connections, allowing you to see its status and basic information at a glance.

Each agent is identified by a unique ID, which makes it easy to manage multiple agents at once. This unique identifier also allows you to take advantage of the Autoexec function, where you can prepare commands to be executed automatically for either all new agents or a specific one.

This functionality becomes especially useful during APT-simulated attacks or large-scale operations, where managing multiple agents efficiently is critical. With Autoexec, you can predefine actions, ensuring that every new agent behaves as expected without having to manually configure each one.

By combining unique IDs, automatic execution, and clear visual feedback in the connection list, Control Pack makes it straightforward to track, manage, and deploy commands across your agents effectively.


Stages in Control Pack

Control Pack is organized into stages to help you follow a clear workflow, from deploying agents to managing them effectively on a target system.

Stage 1: This is where it all begins. During this stage, you will have minimal terminal access, but you can still use all the regular console commands. This allows you to perform basic checks, verify the environment, and interact with the agent while it is active.

Although full functionality isn’t available yet, these commands help ensure that the agent is running correctly and that the connection to the Control Pack server is stable.

Using agents in stages helps avoid detection and forensic analysis in the event that the sample is captured. The focus of this stage is to establish a reliable connection between the agent and your Control Pack server.

Stage 2: Starts once an agent is connected, and you have upgraded from a stage 1 agent to a stage 2 agent. Features like downloading and uploading files, taking screenshots, dumping memory, migrating to another process, encrypting documents, and much more will become available.

In the following pages of this documentation, we will go into detail on each stage, explaining step by step how to deploy, configure, and interact with your agents. Understanding these stages will help you use Control Pack in a structured and effective way.

Last updated

Was this helpful?