Originally video published at: Advanced Threat Tactics (7 of 9): Pivoting – Cobalt Strike Videos
This video shows how to tunnel traffic through Beacon. You’ll learn how to send the Metasploit Framework and other tools through a SOCKS proxy pivot. You’ll also learn how to turn a compromised system into a redirector for callbacks and hosting malicious content. And, you’ll see how to tunnel Beacon over SSH.