Read Time:35 Second
• The #Cobalt_Strike framework, designed for pentesters and #red_team, focused on exploitation and post-exploitation, has long been loved by hackers, ranging from government APT groups to ransomware operators.
• CS provides a full set of functions for managing a loaded module and, accordingly, an infected computer – a keylogger, screenshots, remote access via VNC, injections into processes, bypassing the UAC security system, a mimikatz tool used to compromise access credentials for OS accounts Windows, the ability to scan open ports on company computers, etc.
• Today I will share with you an excellent and free training course: Red Team Operations with Cobalt Strike, in English, but with Russian subtitles.

About Post Author
Treadstone 71
@Treadstone71LLC
Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence