Skip to content

dco-idm/CobaltStrikeLab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Cobalt Strike 1.6 5eva

Overview

This book is broken up into (2) parts, HOW to do something (practical) and WHY we do it that way (theory). The focus of these exercises is, showcase how Cobalt Strike can be utilized as a C2 server.

What is Cobalt Strike?

Cobalt Strike is threat emulation software. Execute targeted attacks against modern enterprises with one of the most powerful network attack kits available to penetration testers. This is not compliance testing. [1]

How are we using Cobalt Strike?

Cobalt Strike was publicly cracked in March 2020 [2].

Why do we use Cobalt Strike?

Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer’s network. Malleable C2 lets you change your network indicators to look like different malware each time. These tools complement Cobalt Strike’s solid social engineering process, its robust collaboration capability, and unique reports designed to aid blue team training. [1]

References:

[1] https://www.cobaltstrike.com/features

[2] https://twitter.com/underthebreach/status/1241814869910990849?lang=en

Releases

No releases published

Packages

 
 
 

Contributors