Post Exploitation Operations with Cobalt Strike
Cobalt Strike is a powerful and versatile penetration testing tool used by cybersecurity professionals to simulate real-world cyberattacks and assess an organization's security posture. You will learn post exploitation operations using Cobalt Strike.
What you'll learn
In this course, Post Exploitation Operations with Cobalt Strike, you’ll learn to perform post exploitation techniques using Cobalt Strike. First, you’ll explore different beacon functionalities. Next, you’ll discover how to perform credential harvesting and privilege escalation. Finally, you’ll learn how to perform lateral movement. When you’re finished with this course, you’ll have the skills and knowledge of Cobalt Strike needed to perform post exploitation operations using Cobalt Strike.
Table of contents
- Course Introduction 1m
- Module Overview 1m
- Cobalt Strike Infrastructure 2m
- Understanding Long, Short, and Interactive Channels 3m
- Listener Overview 3m
- Working with the HTTP Listener 6m
- Adjusting Beacon Sleep and Jitter Values 4m
- Beacon Command Usage 3m
- Working with a TCP Beacon 2m
- Creating an SMB Listener 1m
- Advantages and Disadvantages of Beacon Object Files 2m
- Enhancing Beacons with Beacon Object Files 5m
- Module Summary 1m