This book is broken up into (2) parts, HOW to do something (practical) and WHY we do it that way (theory). The focus of these exercises is, showcase how Cobalt Strike can be utilized as a C2 server.
Cobalt Strike is threat emulation software. Execute targeted attacks against modern enterprises with one of the most powerful network attack kits available to penetration testers. This is not compliance testing. [1]
Cobalt Strike was publicly cracked in March 2020 [2].
Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer’s network. Malleable C2 lets you change your network indicators to look like different malware each time. These tools complement Cobalt Strike’s solid social engineering process, its robust collaboration capability, and unique reports designed to aid blue team training. [1]
[1] https://www.cobaltstrike.com/features
[2] https://twitter.com/underthebreach/status/1241814869910990849?lang=en