Secer - 主页
Articles
登录
Sign In
Sign Up
文章
first
…
74
75
76
77
78
…
last
282
So, you won a regional and you’re headed to National CCDC
cobaltstrike
195
User-defined Storage-based Covert Communication
cobaltstrike
175
Indecent (Penetration Testing) Proposal
cobaltstrike
239
Cobalt Strike 2.3 – I’ve always wanted runas
cobaltstrike
202
How I tunnel Meterpreter through Beacon
cobaltstrike
190
DNS Communication is a Gimmick
cobaltstrike
174
Another Night, Another Actor
cobaltstrike
198
My Favorite PowerShell Post-Exploitation Tools
cobaltstrike
233
Scripting Beacons and Deploying Persistence
cobaltstrike
215
My Constraint-based Product Strategy
cobaltstrike
226
When You Know Your Enemy
cobaltstrike
211
Audiences… or who I think I’m writing for
cobaltstrike
242
What’s the go-to phishing technique or exploit?
cobaltstrike
208
Course Review: Dark Side Ops
cobaltstrike
216
How did your hacking-style change in 2014?
cobaltstrike
179
Pass-the-(Golden)-Ticket with WMIC
cobaltstrike
300
The Best DerbyCon 2014 Talks for Red Teams
cobaltstrike
311
How VPN Pivoting Works (with Source Code)
cobaltstrike
196
Map of Cobalt Strike Features for Armitage Users
cobaltstrike
263
Give me any zero-day and I will rule the world
cobaltstrike
195
Interactive Cortana Programming
cobaltstrike
250
Adversary Simulation Becomes a Thing…
cobaltstrike
220
Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…
cobaltstrike
188
That was a fun fire drill…
cobaltstrike
256
Evolution of a Modern Hacking Payload
cobaltstrike
214
Why can’t I psexec with EXE::Custom?
cobaltstrike
251
Infrastructure for Ongoing Red Team Operations
cobaltstrike
191
The Post Exploitation Team
cobaltstrike
191
Cobalt Strike 2.1 – I have the POWER(shell)
cobaltstrike
192
User-driven Attacks
cobaltstrike
200
The Access Management Team [Shell Sherpas]
cobaltstrike
212
HTTP Proxy Authentication for Malware
cobaltstrike
208
Cobalt Strike 2.0 – Malleable Command and Control
cobaltstrike
206
Use Cobalt Strike’s Beacon with Veil’s Evasion
cobaltstrike
294
Pass-the-Golden-Ticket with Cobalt Strike’s Beacon
cobaltstrike
259
Introducing Morning Catch – A Phishing Paradise
cobaltstrike
205
Puttering my Panda and other Threat Replication Case Studies
cobaltstrike
230
Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.
cobaltstrike
182
Covert Lateral Movement with High-Latency C&C
cobaltstrike
209
The #1 Trait of a Successful Hacker
cobaltstrike
223
Meterpreter Kiwi Extension: Golden Ticket HOWTO
cobaltstrike
208
Connecting to a Metasploit RPC server on Windows is not supported
cobaltstrike
179
The Beachhead
cobaltstrike
263
Cobalt Strike – Innovative Offense or “just a GUI”?
cobaltstrike
186
CCDC Red Teams: Ten Tips to Maximize Success
cobaltstrike
190
Cobalt Strike 03.13.14 – NECCDC Edition
cobaltstrike
302
User Account Control – What Penetration Testers Should Know
cobaltstrike
192
Listeners: Cobalt Strike’s Glue Feature
cobaltstrike
173
What happens when I type getsystem?
cobaltstrike
160
Survival Skills for Small Infosec Vendors
cobaltstrike
first
…
74
75
76
77
78
…
last
Hacking more
...
#attack #hack