5. Post Exploitation - Penetration Testing with Cobalt Strike

Originally video published at: 5. Post Exploitation – Penetration Testing with Cobalt Strike – Cobalt Strike Videos




In this lecture, we find our hero in control of several compromised hosts. We learn how to control these hosts, strategically log keystrokes, steal tokens from domain users, and exfiltrate data.