• The #Cobalt_Strike framework, designed for pentesters and #red_team, focused on exploitation and post-exploitation, has long been loved by hackers, ranging from government APT groups to ransomware operators.
• CS provides a full set of functions for managing a loaded module and, accordingly, an infected computer – a keylogger, screenshots, remote access via VNC, injections into processes, bypassing the UAC security system, a mimikatz tool used to compromise access credentials for OS accounts Windows, the ability to scan open ports on company computers, etc.
• Today I will share with you an excellent and free training course: Red Team Operations with Cobalt Strike, in English, but with Russian subtitles.
