Read Time:35 Second

• The #Cobalt_Strike framework, designed for pentesters and #red_team, focused on exploitation and post-exploitation, has long been loved by hackers, ranging from government APT groups to ransomware operators.

• CS provides a full set of functions for managing a loaded module and, accordingly, an infected computer – a keylogger, screenshots, remote access via VNC, injections into processes, bypassing the UAC security system, a mimikatz tool used to compromise access credentials for OS accounts Windows, the ability to scan open ports on company computers, etc.

• Today I will share with you an excellent and free training course: Red Team Operations with Cobalt Strike, in English, but with Russian subtitles.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: