Originally video published at: 5. Post Exploitation – Penetration Testing with Cobalt Strike – Cobalt Strike Videos
In this lecture, we find our hero in control of several compromised hosts. We learn how to control these hosts, strategically log keystrokes, steal tokens from domain users, and exfiltrate data.