Description: This video shows how to tunnel traffic through Beacon. You'll learn how to send the Metasploit® Framework and other tools through a SOCKS proxy pivot. You'll also learn how to turn a compromised system into a redirector for callbacks and hosting malicious content. And, you'll see how to tunnel Beacon over SSH. http://blog.cobaltstrike.com/2015/09/30/advanced-threat-tactics-course-and-notes/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.