1 |
|
Mimikatz 2.0 Kerberos Golden Ticket Tutorial |
9 years, 11 months |
ArmitageHacker |
|
4516 |
None |
2 |
|
Malleable Command And Control |
9 years, 9 months |
ArmitageHacker |
|
2733 |
None |
3 |
|
Use Cobalt Strike's Payloads With Veil's Evasion |
9 years, 9 months |
ArmitageHacker |
|
3201 |
None |
4 |
|
Pass-The-[Golden]-Ticket With Cobalt Strike's Beacon |
9 years, 9 months |
ArmitageHacker |
|
3668 |
None |
5 |
|
Putter Panda - Threat Replication Case Study |
9 years, 9 months |
ArmitageHacker |
|
3506 |
None |
6 |
|
String Of Paerls - Threat Replication Case Study |
9 years, 9 months |
ArmitageHacker |
|
3038 |
None |
7 |
|
Energetic Bear / Crouching Yeti / Dragonfly - Threat Replication Case Study |
9 years, 8 months |
ArmitageHacker |
|
3716 |
None |
8 |
|
Vpn Pivoting With Cobalt Strike |
9 years, 7 months |
ArmitageHacker |
|
3434 |
None |
9 |
|
Html Application Social Engineering Attack |
9 years, 7 months |
ArmitageHacker |
|
3223 |
None |
10 |
|
Setup A Cobalt Strike Team Server In Amazon's Ec2 |
9 years, 7 months |
ArmitageHacker |
|
3718 |
None |
11 |
|
Powershell Post-Exploitation With Cobalt Strike's Beacon |
9 years, 7 months |
ArmitageHacker |
|
3514 |
None |
12 |
|
Vpn Pivoting Over Icmp |
9 years, 5 months |
ArmitageHacker |
|
2939 |
1 |
13 |
|
Advanced Threat Tactics 2015 - (1/9) Operations |
8 years, 6 months |
ArmitageHacker |
|
2968 |
None |
14 |
|
Advanced Threat Tactics 2015 - (2/9) Infrastructure |
8 years, 6 months |
ArmitageHacker |
|
2920 |
None |
15 |
|
Advanced Threat Tactics 2015 - (3/9) Targeted Attacks |
8 years, 6 months |
ArmitageHacker |
|
3046 |
None |
16 |
|
Advanced Threat Tactics 2015 - (4/9) Post Exploitation |
8 years, 6 months |
ArmitageHacker |
|
3599 |
None |
17 |
|
Advanced Threat Tactics 2015 - (5/9) Privilege Escalation |
8 years, 6 months |
ArmitageHacker |
|
3418 |
None |
18 |
|
Advanced Threat Tactics 2015 - (6/9) Lateral Movement |
8 years, 6 months |
ArmitageHacker |
|
3326 |
None |
19 |
|
Advanced Threat Tactics 2015 - (7/9) Pivoting |
8 years, 6 months |
ArmitageHacker |
|
3398 |
None |
20 |
|
Advanced Threat Tactics 2015 - (8/9) Malleable Command And Control |
8 years, 6 months |
ArmitageHacker |
|
3360 |
None |
21 |
|
Advanced Threat Tactics 2015 - (9/9) Evasion |
8 years, 6 months |
ArmitageHacker |
|
3357 |
None |
22 |
|
Multi-Player Metasploit -- Realized |
13 years, 2 months |
ArmitageHacker |
metasploit, armitage, collaboration, red team, network attack |
6030 |
4 |
23 |
|
Armitage @ Reverse Space |
13 years, 2 months |
ArmitageHacker |
collaboration, armitage, metasploit, red team, tutorial, getting started |
5609 |
2 |
24 |
|
Penetration Testing With Armitage |
13 years, 1 month |
ArmitageHacker |
armitage, metasploit |
8030 |
4 |
25 |
|
Armitage Introduction 101 |
13 years |
ArmitageHacker |
armitage, 101, metasploit |
6843 |
3 |
26 |
|
Armitage For Metasploit On Fox's Breaking In |
12 years, 11 months |
ArmitageHacker |
armitage, metasploit, cameo, Fox, breaking in, breakingin, television, pop culture |
5926 |
1 |
27 |
|
Network Attack Collaboration And Meterpreter Session Sharing |
12 years, 10 months |
ArmitageHacker |
red team, collaboration, data sharing, metasploit, session sharing, meterpreter |
6268 |
3 |
28 |
|
Armitage Multi-Player Mode (For Metasploit) Demonstration |
12 years, 9 months |
ArmitageHacker |
armitage, red team, collaboration, metasploit |
6418 |
3 |
29 |
|
Metasploit 4.0 And Armitage - What's New? |
12 years, 9 months |
ArmitageHacker |
armitage, metasploit, meterpreter, metasploit 4, metasploit 4.0 |
8175 |
1 |
30 |
|
Metasploit And Armitage Training - Introduction (1/6) |
12 years, 8 months |
ArmitageHacker |
metasploit, armitage, penetration testing |
10130 |
2 |
31 |
|
Metasploit And Armitage Training - Metasploit (2/6) |
12 years, 8 months |
ArmitageHacker |
metasploit, meterpreter, armitage |
6563 |
3 |
32 |
|
Metasploit And Armitage Training - Access (3/6) |
12 years, 8 months |
ArmitageHacker |
metasploit, armitage, client-side attacks, remote exploits, trojans |
12486 |
9 |
33 |
|
Metasploit And Armitage Training - Post Exploitation (4/6) |
12 years, 8 months |
ArmitageHacker |
armitage, meterpreter, metasploit, post-exploitation |
6160 |
1 |
34 |
|
Metasploit And Armitage Training - Maneuver (5/6) |
12 years, 8 months |
ArmitageHacker |
armitage, metasploit, pass the hash, hashdump, pivoting |
6719 |
1 |
35 |
|
Metasploit And Armitage Training - Team Tactics (6/6) |
12 years, 8 months |
ArmitageHacker |
armitage, metasploit, proxychains, pivoting, collaboration |
7625 |
7 |
36 |
|
Metasploit 4.1 And Armitage: What's New? |
12 years, 6 months |
ArmitageHacker |
armitage, metasploit, gui, metasploit 4.1 |
8876 |
11 |
37 |
|
Cross-Platform Java Exploit (Cve-2011-3544) Demonstration |
12 years, 4 months |
ArmitageHacker |
Java, cross-platform, exploit, demonstration, armitage, metasploit, CVE-2011-3544, applet |
10296 |
11 |
38 |
|
Securitytube Metasploit Framework Expert ( Armitage ) |
12 years, 4 months |
ArmitageHacker |
amitage, metasploit, reconnaissance, exploitation, post-exploitation, demo, smfe |
42714 |
46 |
39 |
|
Armitage For Metasploit 4.2 - What's New? |
12 years, 2 months |
ArmitageHacker |
armitage, metasploit, red team, collaboration |
5726 |
1 |
40 |
|
Force Multipliers For Red Team Operations |
11 years, 9 months |
ArmitageHacker |
red team, process, collaboration, metasploit, armitage, ccdc |
3788 |
None |
41 |
|
Scripting With Cortana - Cobalt Strike |
11 years, 8 months |
ArmitageHacker |
cortana, armitage, metasploit, scripting, automation |
4872 |
1 |
42 |
|
Covert Vpn - Layer 2 Pivoting |
11 years, 7 months |
ArmitageHacker |
Cobalt Strike, Armitage, pivoting, vpn pivoting, meterpreter, post-exploitation |
4995 |
None |
43 |
|
Beacon - Covert Command And Control For Cobalt Strike |
11 years, 7 months |
ArmitageHacker |
beaconing, malware, command and control, post-exploitation, APT, cobalt strike, armitage, C2, DNS, covert communication |
4879 |
None |
44 |
|
Microsoft Word And Excel Macro Attack |
11 years, 4 months |
ArmitageHacker |
cobalt strike, armitage, metasploit, microsoft office, microsoft word, macro, VBA |
5596 |
1 |
45 |
|
A Vision For Distributed Red Team Operations |
11 years, 2 months |
ArmitageHacker |
pen testing, collaboration, red team, distributed ops, scale, cobalt strike, armitage, team hacking |
3810 |
None |
46 |
|
Command And Control Over Dns With Beacon |
10 years, 10 months |
ArmitageHacker |
dns, C2, covert channel, beacon, payload, Cobalt Strike, armitage |
4887 |
None |
47 |
|
Dns And Http Pivoting With Cobalt Strike's Beacon |
10 years, 9 months |
ArmitageHacker |
|
3800 |
None |
48 |
|
Cobalt Strike 1.47 - What's New? |
10 years, 8 months |
ArmitageHacker |
|
3393 |
None |
49 |
|
Browser Pivoting (Two-Factor Auth? Hah!) |
10 years, 7 months |
ArmitageHacker |
|
3809 |
None |
50 |
|
Tradecraft (1 Of 9) - Introduction |
10 years, 6 months |
ArmitageHacker |
cobalt strike, metasploit, metasploit framework, armitage, tradecraft, series |
4151 |
None |
51 |
|
Tradecraft (2 Of 9) - Basic Exploitation (Hacking Circa 2003) |
10 years, 6 months |
ArmitageHacker |
tradecraft, series, cobalt strike, metasploit framework, beginner, exploits, ms08_067_netapi, ssh, pivoting, brute force |
3618 |
None |
52 |
|
Tradecraft (3 Of 9) - Getting A Foothold |
10 years, 6 months |
ArmitageHacker |
tradecraft, series, cobalt strike, client-side attack, java signed applet, java exploit, system profiler, reconnaissance, phishing, spear phishing |
3335 |
None |
53 |
|
Tradecraft (4 Of 9) - Social Engineering |
10 years, 6 months |
ArmitageHacker |
cobalt strike, tradecraft, series, spear phishing, watering hole attack, website clone, phishing site |
3270 |
None |
54 |
|
Tradecraft (5 Of 9) - Post Exploitation With Beacon |
10 years, 6 months |
ArmitageHacker |
tradecraft, cobalt strike, series, beacon, beaconing, malware, low and slow, stealth, evasion, dns, covert communication |
3819 |
None |
55 |
|
Tradecraft (6 Of 9) - Post Exploitation With Meterpreter |
10 years, 6 months |
ArmitageHacker |
cobalt strike, meterpreter, post-exploitation, pivot, privilege escalation, proxychains, browser pivoting, pivoting |
3621 |
None |
56 |
|
Tradecraft (7 Of 9) - Lateral Movement |
10 years, 6 months |
ArmitageHacker |
tradecraft, cobalt strike, lateral movement, at, schtasks, sc, token stealing, access tokens, active directory, gpp, group policy preferences, mimikatz, hashdump, pass the hash, psexec, nltest, net view, windows |
4639 |
None |
57 |
|
Tradecraft (8 Of 9) - Offense In Depth |
10 years, 6 months |
ArmitageHacker |
cobalt strike, tradecraft, application whitelisting, anti-virus, anti-virus evasion, payloads, payload staging, IDS, email spoofing, phishing, SPF, DKIM, DMARC, spam, anti-spam, egress, network access control, firewall |
3676 |
None |
58 |
|
Tradecraft (9 Of 9) - Operations |
10 years, 6 months |
ArmitageHacker |
cobalt strike, collaboration, distributed operations, cortana, scripting, red team |
3248 |
None |
59 |
|
Stealthy Peer-To-Peer Communication With Cobalt Strike's Beacon |
10 years, 5 months |
ArmitageHacker |
cobalt strike, beacon, peer to peer, P2P, stealth, persistence |
4701 |
None |
60 |
|
Man-In-The-Browser Session Hijacking |
10 years, 4 months |
ArmitageHacker |
cobalt strike, browser pivoting, man-in-the-browser, two-factor authentication |
3909 |
None |
61 |
|
Deliver Dns Trojan With Microsoft Office Macro |
10 years, 3 months |
ArmitageHacker |
|
2659 |
None |
62 |
|
Privilege Escalation To Domain Admin And Lateral Movement |
10 years, 2 months |
ArmitageHacker |
|
3386 |
None |
63 |
|
Bypass Uac On Windows 8.1 |
10 years, 1 month |
ArmitageHacker |
|
6810 |
1 |
64 |
|
Covert Lateral Movement And Named Pipe Communication |
9 years, 12 months |
ArmitageHacker |
|
2010 |
None |
65 |
|
Getting Beacon Past Http Proxy Authentication |
9 years, 12 months |
ArmitageHacker |
|
2152 |
None |