Hi Friend, This evening, I am excited to present a concise tutorial on harnessing the power of CobaltStrike for effective lateral movement within a network.
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Friend, This evening, I am excited to present a concise tutorial on harnessing the power of CobaltStrike for effective lateral movement within a network.
Hi Friends I would like to share some tricks and simple steps on impersonating user with CobaltStrike. There is situation where you have compromised a
Hi Friends. I did some excercise on the pentest in order to refresh my knowledge. During my exercise, I was progressing on certain attack on
Hi Friends Just exercise arround with some vulnerable box available. I found something simple but effective in escalating our privilege. During my post exploitation, I
Hallo Friends… Today, I going to write a very simple Cobaltstrike redirector with Nginx which will help you to hide your C2 server from being
My Friends, Just a quick simple and very basic tutorial on how to create an automation to extract malware configuration from PE file. I made