Secer - 主页
Articles
登录
Sign In
Sign Up
文章
first
…
74
75
76
77
78
…
last
303
So, you won a regional and you’re headed to National CCDC
cobaltstrike
213
User-defined Storage-based Covert Communication
cobaltstrike
198
Indecent (Penetration Testing) Proposal
cobaltstrike
259
Cobalt Strike 2.3 – I’ve always wanted runas
cobaltstrike
229
How I tunnel Meterpreter through Beacon
cobaltstrike
207
DNS Communication is a Gimmick
cobaltstrike
185
Another Night, Another Actor
cobaltstrike
222
My Favorite PowerShell Post-Exploitation Tools
cobaltstrike
252
Scripting Beacons and Deploying Persistence
cobaltstrike
238
My Constraint-based Product Strategy
cobaltstrike
254
When You Know Your Enemy
cobaltstrike
233
Audiences… or who I think I’m writing for
cobaltstrike
273
What’s the go-to phishing technique or exploit?
cobaltstrike
224
Course Review: Dark Side Ops
cobaltstrike
240
How did your hacking-style change in 2014?
cobaltstrike
205
Pass-the-(Golden)-Ticket with WMIC
cobaltstrike
338
The Best DerbyCon 2014 Talks for Red Teams
cobaltstrike
333
How VPN Pivoting Works (with Source Code)
cobaltstrike
219
Map of Cobalt Strike Features for Armitage Users
cobaltstrike
291
Give me any zero-day and I will rule the world
cobaltstrike
218
Interactive Cortana Programming
cobaltstrike
278
Adversary Simulation Becomes a Thing…
cobaltstrike
240
Cobalt Strike 2.2 – 1995 called, it wants its covert channel back…
cobaltstrike
213
That was a fun fire drill…
cobaltstrike
282
Evolution of a Modern Hacking Payload
cobaltstrike
234
Why can’t I psexec with EXE::Custom?
cobaltstrike
273
Infrastructure for Ongoing Red Team Operations
cobaltstrike
212
The Post Exploitation Team
cobaltstrike
213
Cobalt Strike 2.1 – I have the POWER(shell)
cobaltstrike
212
User-driven Attacks
cobaltstrike
229
The Access Management Team [Shell Sherpas]
cobaltstrike
237
HTTP Proxy Authentication for Malware
cobaltstrike
237
Cobalt Strike 2.0 – Malleable Command and Control
cobaltstrike
231
Use Cobalt Strike’s Beacon with Veil’s Evasion
cobaltstrike
321
Pass-the-Golden-Ticket with Cobalt Strike’s Beacon
cobaltstrike
278
Introducing Morning Catch – A Phishing Paradise
cobaltstrike
222
Puttering my Panda and other Threat Replication Case Studies
cobaltstrike
251
Cobalt Strike 1.49 – HTTP Proxy Authentication? No Problem.
cobaltstrike
213
Covert Lateral Movement with High-Latency C&C
cobaltstrike
228
The #1 Trait of a Successful Hacker
cobaltstrike
244
Meterpreter Kiwi Extension: Golden Ticket HOWTO
cobaltstrike
228
Connecting to a Metasploit RPC server on Windows is not supported
cobaltstrike
201
The Beachhead
cobaltstrike
287
Cobalt Strike – Innovative Offense or “just a GUI”?
cobaltstrike
195
CCDC Red Teams: Ten Tips to Maximize Success
cobaltstrike
212
Cobalt Strike 03.13.14 – NECCDC Edition
cobaltstrike
338
User Account Control – What Penetration Testers Should Know
cobaltstrike
216
Listeners: Cobalt Strike’s Glue Feature
cobaltstrike
197
What happens when I type getsystem?
cobaltstrike
178
Survival Skills for Small Infosec Vendors
cobaltstrike
first
…
74
75
76
77
78
…
last
Hacking more
...
#attack #hack