1 |
 |
Mimikatz 2.0 Kerberos Golden Ticket Tutorial |
9 years, 4 months |
ArmitageHacker |
|
4203 |
None |
2 |
 |
Malleable Command And Control |
9 years, 2 months |
ArmitageHacker |
|
2429 |
None |
3 |
 |
Use Cobalt Strike's Payloads With Veil's Evasion |
9 years, 2 months |
ArmitageHacker |
|
2894 |
None |
4 |
 |
Pass-The-[Golden]-Ticket With Cobalt Strike's Beacon |
9 years, 1 month |
ArmitageHacker |
|
3335 |
None |
5 |
 |
Putter Panda - Threat Replication Case Study |
9 years, 1 month |
ArmitageHacker |
|
3174 |
None |
6 |
 |
String Of Paerls - Threat Replication Case Study |
9 years, 1 month |
ArmitageHacker |
|
2744 |
None |
7 |
 |
Energetic Bear / Crouching Yeti / Dragonfly - Threat Replication Case Study |
9 years, 1 month |
ArmitageHacker |
|
3391 |
None |
8 |
 |
Vpn Pivoting With Cobalt Strike |
9 years |
ArmitageHacker |
|
3110 |
None |
9 |
 |
Html Application Social Engineering Attack |
9 years |
ArmitageHacker |
|
2921 |
None |
10 |
 |
Setup A Cobalt Strike Team Server In Amazon's Ec2 |
9 years |
ArmitageHacker |
|
3378 |
None |
11 |
 |
Powershell Post-Exploitation With Cobalt Strike's Beacon |
9 years |
ArmitageHacker |
|
3199 |
None |
12 |
 |
Vpn Pivoting Over Icmp |
8 years, 10 months |
ArmitageHacker |
|
2633 |
1 |
13 |
 |
Advanced Threat Tactics 2015 - (1/9) Operations |
7 years, 11 months |
ArmitageHacker |
|
2664 |
None |
14 |
 |
Advanced Threat Tactics 2015 - (2/9) Infrastructure |
7 years, 11 months |
ArmitageHacker |
|
2620 |
None |
15 |
 |
Advanced Threat Tactics 2015 - (3/9) Targeted Attacks |
7 years, 11 months |
ArmitageHacker |
|
2742 |
None |
16 |
 |
Advanced Threat Tactics 2015 - (4/9) Post Exploitation |
7 years, 11 months |
ArmitageHacker |
|
3290 |
None |
17 |
 |
Advanced Threat Tactics 2015 - (5/9) Privilege Escalation |
7 years, 11 months |
ArmitageHacker |
|
3111 |
None |
18 |
 |
Advanced Threat Tactics 2015 - (6/9) Lateral Movement |
7 years, 11 months |
ArmitageHacker |
|
3006 |
None |
19 |
 |
Advanced Threat Tactics 2015 - (7/9) Pivoting |
7 years, 11 months |
ArmitageHacker |
|
3090 |
None |
20 |
 |
Advanced Threat Tactics 2015 - (8/9) Malleable Command And Control |
7 years, 11 months |
ArmitageHacker |
|
3053 |
None |
21 |
 |
Advanced Threat Tactics 2015 - (9/9) Evasion |
7 years, 11 months |
ArmitageHacker |
|
3047 |
None |
22 |
 |
Multi-Player Metasploit -- Realized |
12 years, 7 months |
ArmitageHacker |
metasploit, armitage, collaboration, red team, network attack |
5718 |
4 |
23 |
 |
Armitage @ Reverse Space |
12 years, 7 months |
ArmitageHacker |
collaboration, armitage, metasploit, red team, tutorial, getting started |
5298 |
2 |
24 |
 |
Penetration Testing With Armitage |
12 years, 6 months |
ArmitageHacker |
armitage, metasploit |
7729 |
4 |
25 |
 |
Armitage Introduction 101 |
12 years, 5 months |
ArmitageHacker |
armitage, 101, metasploit |
6536 |
3 |
26 |
 |
Armitage For Metasploit On Fox's Breaking In |
12 years, 4 months |
ArmitageHacker |
armitage, metasploit, cameo, Fox, breaking in, breakingin, television, pop culture |
5615 |
1 |
27 |
 |
Network Attack Collaboration And Meterpreter Session Sharing |
12 years, 3 months |
ArmitageHacker |
red team, collaboration, data sharing, metasploit, session sharing, meterpreter |
5952 |
3 |
28 |
 |
Armitage Multi-Player Mode (For Metasploit) Demonstration |
12 years, 2 months |
ArmitageHacker |
armitage, red team, collaboration, metasploit |
6110 |
3 |
29 |
 |
Metasploit 4.0 And Armitage - What's New? |
12 years, 1 month |
ArmitageHacker |
armitage, metasploit, meterpreter, metasploit 4, metasploit 4.0 |
7822 |
1 |
30 |
 |
Metasploit And Armitage Training - Introduction (1/6) |
12 years, 1 month |
ArmitageHacker |
metasploit, armitage, penetration testing |
9810 |
2 |
31 |
 |
Metasploit And Armitage Training - Metasploit (2/6) |
12 years, 1 month |
ArmitageHacker |
metasploit, meterpreter, armitage |
6258 |
3 |
32 |
 |
Metasploit And Armitage Training - Access (3/6) |
12 years, 1 month |
ArmitageHacker |
metasploit, armitage, client-side attacks, remote exploits, trojans |
12172 |
9 |
33 |
 |
Metasploit And Armitage Training - Post Exploitation (4/6) |
12 years, 1 month |
ArmitageHacker |
armitage, meterpreter, metasploit, post-exploitation |
5860 |
1 |
34 |
 |
Metasploit And Armitage Training - Maneuver (5/6) |
12 years, 1 month |
ArmitageHacker |
armitage, metasploit, pass the hash, hashdump, pivoting |
6402 |
1 |
35 |
 |
Metasploit And Armitage Training - Team Tactics (6/6) |
12 years, 1 month |
ArmitageHacker |
armitage, metasploit, proxychains, pivoting, collaboration |
7272 |
7 |
36 |
 |
Metasploit 4.1 And Armitage: What's New? |
11 years, 11 months |
ArmitageHacker |
armitage, metasploit, gui, metasploit 4.1 |
8540 |
11 |
37 |
 |
Cross-Platform Java Exploit (Cve-2011-3544) Demonstration |
11 years, 10 months |
ArmitageHacker |
Java, cross-platform, exploit, demonstration, armitage, metasploit, CVE-2011-3544, applet |
9883 |
11 |
38 |
 |
Securitytube Metasploit Framework Expert ( Armitage ) |
11 years, 9 months |
ArmitageHacker |
amitage, metasploit, reconnaissance, exploitation, post-exploitation, demo, smfe |
42181 |
46 |
39 |
 |
Armitage For Metasploit 4.2 - What's New? |
11 years, 7 months |
ArmitageHacker |
armitage, metasploit, red team, collaboration |
5444 |
1 |
40 |
 |
Force Multipliers For Red Team Operations |
11 years, 1 month |
ArmitageHacker |
red team, process, collaboration, metasploit, armitage, ccdc |
3507 |
None |
41 |
 |
Scripting With Cortana - Cobalt Strike |
11 years, 1 month |
ArmitageHacker |
cortana, armitage, metasploit, scripting, automation |
4532 |
1 |
42 |
 |
Covert Vpn - Layer 2 Pivoting |
11 years |
ArmitageHacker |
Cobalt Strike, Armitage, pivoting, vpn pivoting, meterpreter, post-exploitation |
4644 |
None |
43 |
 |
Beacon - Covert Command And Control For Cobalt Strike |
10 years, 12 months |
ArmitageHacker |
beaconing, malware, command and control, post-exploitation, APT, cobalt strike, armitage, C2, DNS, covert communication |
4541 |
None |
44 |
 |
Microsoft Word And Excel Macro Attack |
10 years, 9 months |
ArmitageHacker |
cobalt strike, armitage, metasploit, microsoft office, microsoft word, macro, VBA |
5238 |
1 |
45 |
 |
A Vision For Distributed Red Team Operations |
10 years, 7 months |
ArmitageHacker |
pen testing, collaboration, red team, distributed ops, scale, cobalt strike, armitage, team hacking |
3460 |
None |
46 |
 |
Command And Control Over Dns With Beacon |
10 years, 3 months |
ArmitageHacker |
dns, C2, covert channel, beacon, payload, Cobalt Strike, armitage |
4547 |
None |
47 |
 |
Dns And Http Pivoting With Cobalt Strike's Beacon |
10 years, 2 months |
ArmitageHacker |
|
3517 |
None |
48 |
 |
Cobalt Strike 1.47 - What's New? |
10 years, 1 month |
ArmitageHacker |
|
3105 |
None |
49 |
 |
Browser Pivoting (Two-Factor Auth? Hah!) |
9 years, 12 months |
ArmitageHacker |
|
3517 |
None |
50 |
 |
Tradecraft (1 Of 9) - Introduction |
9 years, 11 months |
ArmitageHacker |
cobalt strike, metasploit, metasploit framework, armitage, tradecraft, series |
3820 |
None |
51 |
 |
Tradecraft (2 Of 9) - Basic Exploitation (Hacking Circa 2003) |
9 years, 11 months |
ArmitageHacker |
tradecraft, series, cobalt strike, metasploit framework, beginner, exploits, ms08_067_netapi, ssh, pivoting, brute force |
3259 |
None |
52 |
 |
Tradecraft (3 Of 9) - Getting A Foothold |
9 years, 11 months |
ArmitageHacker |
tradecraft, series, cobalt strike, client-side attack, java signed applet, java exploit, system profiler, reconnaissance, phishing, spear phishing |
2982 |
None |
53 |
 |
Tradecraft (4 Of 9) - Social Engineering |
9 years, 11 months |
ArmitageHacker |
cobalt strike, tradecraft, series, spear phishing, watering hole attack, website clone, phishing site |
2945 |
None |
54 |
 |
Tradecraft (5 Of 9) - Post Exploitation With Beacon |
9 years, 11 months |
ArmitageHacker |
tradecraft, cobalt strike, series, beacon, beaconing, malware, low and slow, stealth, evasion, dns, covert communication |
3466 |
None |
55 |
 |
Tradecraft (6 Of 9) - Post Exploitation With Meterpreter |
9 years, 11 months |
ArmitageHacker |
cobalt strike, meterpreter, post-exploitation, pivot, privilege escalation, proxychains, browser pivoting, pivoting |
3260 |
None |
56 |
 |
Tradecraft (7 Of 9) - Lateral Movement |
9 years, 11 months |
ArmitageHacker |
tradecraft, cobalt strike, lateral movement, at, schtasks, sc, token stealing, access tokens, active directory, gpp, group policy preferences, mimikatz, hashdump, pass the hash, psexec, nltest, net view, windows |
4253 |
None |
57 |
 |
Tradecraft (8 Of 9) - Offense In Depth |
9 years, 11 months |
ArmitageHacker |
cobalt strike, tradecraft, application whitelisting, anti-virus, anti-virus evasion, payloads, payload staging, IDS, email spoofing, phishing, SPF, DKIM, DMARC, spam, anti-spam, egress, network access control, firewall |
3329 |
None |
58 |
 |
Tradecraft (9 Of 9) - Operations |
9 years, 11 months |
ArmitageHacker |
cobalt strike, collaboration, distributed operations, cortana, scripting, red team |
2926 |
None |
59 |
 |
Stealthy Peer-To-Peer Communication With Cobalt Strike's Beacon |
9 years, 10 months |
ArmitageHacker |
cobalt strike, beacon, peer to peer, P2P, stealth, persistence |
4371 |
None |
60 |
 |
Man-In-The-Browser Session Hijacking |
9 years, 9 months |
ArmitageHacker |
cobalt strike, browser pivoting, man-in-the-browser, two-factor authentication |
3576 |
None |
61 |
 |
Deliver Dns Trojan With Microsoft Office Macro |
9 years, 8 months |
ArmitageHacker |
|
2417 |
None |
62 |
 |
Privilege Escalation To Domain Admin And Lateral Movement |
9 years, 7 months |
ArmitageHacker |
|
3151 |
None |
63 |
 |
Bypass Uac On Windows 8.1 |
9 years, 6 months |
ArmitageHacker |
|
6543 |
1 |
64 |
 |
Covert Lateral Movement And Named Pipe Communication |
9 years, 4 months |
ArmitageHacker |
|
1773 |
None |
65 |
 |
Getting Beacon Past Http Proxy Authentication |
9 years, 4 months |
ArmitageHacker |
|
1927 |
None |