Description: Let's go over what happens once you get into a network. Learn how to manage Beacons, pass sessions, exfiltrate data, log keystrokes, grab screenshots from many systems at once, and scan for targets. This lecture also covers browser pivoting, Cobalt Strike's innovative man-in-the-browser session stealing attack. http://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.