Secer - 主页
Articles
登录
Sign In
Sign Up
文章
first
…
74
75
76
77
78
…
last
222
So, you won a regional and you’re headed to National CCDC
cobaltstrike
139
User-defined Storage-based Covert Communication
cobaltstrike
120
Indecent (Penetration Testing) Proposal
cobaltstrike
186
Cobalt Strike 2.3 – I’ve always wanted runas
cobaltstrike
139
How I tunnel Meterpreter through Beacon
cobaltstrike
138
DNS Communication is a Gimmick
cobaltstrike
136
Another Night, Another Actor
cobaltstrike
143
My Favorite PowerShell Post-Exploitation Tools
cobaltstrike
175
Scripting Beacons and Deploying Persistence
cobaltstrike
144
My Constraint-based Product Strategy
cobaltstrike
152
When You Know Your Enemy
cobaltstrike
147
Audiences… or who I think I’m writing for
cobaltstrike
187
What’s the go-to phishing technique or exploit?
cobaltstrike
158
Course Review: Dark Side Ops
cobaltstrike
157
How did your hacking-style change in 2014?
cobaltstrike
132
Pass-the-(Golden)-Ticket with WMIC
cobaltstrike
239
The Best DerbyCon 2014 Talks for Red Teams
cobaltstrike
257
How VPN Pivoting Works (with Source Code)
cobaltstrike
139
Map of Cobalt Strike Features for Armitage Users
cobaltstrike
203
Give me any zero-day and I will rule the world
cobaltstrike
139
Interactive Cortana Programming
cobaltstrike
187
Adversary Simulation Becomes a Thing…
cobaltstrike
167
Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…
cobaltstrike
135
That was a fun fire drill…
cobaltstrike
200
Evolution of a Modern Hacking Payload
cobaltstrike
157
Why can’t I psexec with EXE::Custom?
cobaltstrike
200
Infrastructure for Ongoing Red Team Operations
cobaltstrike
134
The Post Exploitation Team
cobaltstrike
136
Cobalt Strike 2.1 – I have the POWER(shell)
cobaltstrike
141
User-driven Attacks
cobaltstrike
144
The Access Management Team [Shell Sherpas]
cobaltstrike
153
HTTP Proxy Authentication for Malware
cobaltstrike
155
Cobalt Strike 2.0 – Malleable Command and Control
cobaltstrike
154
Use Cobalt Strike’s Beacon with Veil’s Evasion
cobaltstrike
235
Pass-the-Golden-Ticket with Cobalt Strike’s Beacon
cobaltstrike
210
Introducing Morning Catch – A Phishing Paradise
cobaltstrike
151
Puttering my Panda and other Threat Replication Case Studies
cobaltstrike
175
Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.
cobaltstrike
138
Covert Lateral Movement with High-Latency C&C
cobaltstrike
148
The #1 Trait of a Successful Hacker
cobaltstrike
169
Meterpreter Kiwi Extension: Golden Ticket HOWTO
cobaltstrike
148
Connecting to a Metasploit RPC server on Windows is not supported
cobaltstrike
122
The Beachhead
cobaltstrike
203
Cobalt Strike – Innovative Offense or “just a GUI”?
cobaltstrike
154
CCDC Red Teams: Ten Tips to Maximize Success
cobaltstrike
135
Cobalt Strike 03.13.14 – NECCDC Edition
cobaltstrike
210
User Account Control – What Penetration Testers Should Know
cobaltstrike
135
Listeners: Cobalt Strike’s Glue Feature
cobaltstrike
121
What happens when I type getsystem?
cobaltstrike
108
Survival Skills for Small Infosec Vendors
cobaltstrike
first
…
74
75
76
77
78
…
last
Hacking more
...
#attack #hack