• XSS.stack #1 – первый литературный журнал от юзеров форума

Keeping my C2 server anonymous, how can I do this?

Google about this and you will find plenty, there is a full course on YouTube from the creator and it is one of the most well documented tools out there (for us and blues). You need to learn to do research if you seriously want to pursue this kind of job though.
yeah, i'll try
thanks for your advice :)
 
I suggest you watch these videos by the Cobalt Strike creator it goes over operations, infrastructure, c2, weaponization, initial access, post exploitation, privilege escalation, lateral movement, and pivoting.

Operations
Infrastructure
C2
Weaponization
Initial Access
Post Exploitation
Privilege Escalation
Lateral Movement
Pivoting

You can find much more videos and blogs going more in depth with cobalt strike.
 
I suggest you watch these videos by the Cobalt Strike creator it goes over operations, infrastructure, c2, weaponization, initial access, post exploitation, privilege escalation, lateral movement, and pivoting.

Operations
Infrastructure
C2
Weaponization
Initial Access
Post Exploitation
Privilege Escalation
Lateral Movement
Pivoting

You can find much more videos and blogs going more in depth with cobalt strike.
thanks for these, i'll definitely check them out
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Hi,

I've got a CobaltStrike C2 set up and I want to know what's the best way to keep it anonymous so nobody can track it down, how would I do this?
I'm quite new so please forgive me if this is a dumb question.

All advice helpful
I have this tutorial in my to-do this month, keep tunned
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх