1 |
 |
Mimikatz 2.0 Kerberos Golden Ticket Tutorial |
6 years, 11 months |
ArmitageHacker |
|
3199 |
None |
2 |
 |
Malleable Command And Control |
6 years, 9 months |
ArmitageHacker |
|
1469 |
None |
3 |
 |
Use Cobalt Strike's Payloads With Veil's Evasion |
6 years, 9 months |
ArmitageHacker |
|
1828 |
None |
4 |
 |
Pass-The-[Golden]-Ticket With Cobalt Strike's Beacon |
6 years, 8 months |
ArmitageHacker |
|
2244 |
None |
5 |
 |
Putter Panda - Threat Replication Case Study |
6 years, 8 months |
ArmitageHacker |
|
2050 |
None |
6 |
 |
String Of Paerls - Threat Replication Case Study |
6 years, 8 months |
ArmitageHacker |
|
1807 |
None |
7 |
 |
Energetic Bear / Crouching Yeti / Dragonfly - Threat Replication Case Study |
6 years, 8 months |
ArmitageHacker |
|
2429 |
None |
8 |
 |
Vpn Pivoting With Cobalt Strike |
6 years, 7 months |
ArmitageHacker |
|
2075 |
None |
9 |
 |
Html Application Social Engineering Attack |
6 years, 7 months |
ArmitageHacker |
|
1964 |
None |
10 |
 |
Setup A Cobalt Strike Team Server In Amazon's Ec2 |
6 years, 7 months |
ArmitageHacker |
|
2270 |
None |
11 |
 |
Powershell Post-Exploitation With Cobalt Strike's Beacon |
6 years, 7 months |
ArmitageHacker |
|
2248 |
None |
12 |
 |
Vpn Pivoting Over Icmp |
6 years, 5 months |
ArmitageHacker |
|
1689 |
1 |
13 |
 |
Advanced Threat Tactics 2015 - (1/9) Operations |
5 years, 6 months |
ArmitageHacker |
|
1712 |
None |
14 |
 |
Advanced Threat Tactics 2015 - (2/9) Infrastructure |
5 years, 6 months |
ArmitageHacker |
|
1672 |
None |
15 |
 |
Advanced Threat Tactics 2015 - (3/9) Targeted Attacks |
5 years, 6 months |
ArmitageHacker |
|
1817 |
None |
16 |
 |
Advanced Threat Tactics 2015 - (4/9) Post Exploitation |
5 years, 6 months |
ArmitageHacker |
|
2127 |
None |
17 |
 |
Advanced Threat Tactics 2015 - (5/9) Privilege Escalation |
5 years, 6 months |
ArmitageHacker |
|
2173 |
None |
18 |
 |
Advanced Threat Tactics 2015 - (6/9) Lateral Movement |
5 years, 6 months |
ArmitageHacker |
|
2059 |
None |
19 |
 |
Advanced Threat Tactics 2015 - (7/9) Pivoting |
5 years, 6 months |
ArmitageHacker |
|
2150 |
None |
20 |
 |
Advanced Threat Tactics 2015 - (8/9) Malleable Command And Control |
5 years, 6 months |
ArmitageHacker |
|
2083 |
None |
21 |
 |
Advanced Threat Tactics 2015 - (9/9) Evasion |
5 years, 6 months |
ArmitageHacker |
|
2103 |
None |
22 |
 |
Multi-Player Metasploit -- Realized |
10 years, 2 months |
ArmitageHacker |
metasploit, armitage, collaboration, red team, network attack |
4211 |
4 |
23 |
 |
Armitage @ Reverse Space |
10 years, 1 month |
ArmitageHacker |
collaboration, armitage, metasploit, red team, tutorial, getting started |
3987 |
2 |
24 |
 |
Penetration Testing With Armitage |
10 years |
ArmitageHacker |
armitage, metasploit |
6453 |
4 |
25 |
 |
Armitage Introduction 101 |
10 years |
ArmitageHacker |
armitage, 101, metasploit |
5161 |
3 |
26 |
 |
Armitage For Metasploit On Fox's Breaking In |
9 years, 11 months |
ArmitageHacker |
armitage, metasploit, cameo, Fox, breaking in, breakingin, television, pop culture |
4016 |
1 |
27 |
 |
Network Attack Collaboration And Meterpreter Session Sharing |
9 years, 10 months |
ArmitageHacker |
red team, collaboration, data sharing, metasploit, session sharing, meterpreter |
4657 |
3 |
28 |
 |
Armitage Multi-Player Mode (For Metasploit) Demonstration |
9 years, 9 months |
ArmitageHacker |
armitage, red team, collaboration, metasploit |
4629 |
3 |
29 |
 |
Metasploit 4.0 And Armitage - What's New? |
9 years, 8 months |
ArmitageHacker |
armitage, metasploit, meterpreter, metasploit 4, metasploit 4.0 |
6131 |
1 |
30 |
 |
Metasploit And Armitage Training - Introduction (1/6) |
9 years, 8 months |
ArmitageHacker |
metasploit, armitage, penetration testing |
8210 |
2 |
31 |
 |
Metasploit And Armitage Training - Metasploit (2/6) |
9 years, 8 months |
ArmitageHacker |
metasploit, meterpreter, armitage |
4970 |
3 |
32 |
 |
Metasploit And Armitage Training - Access (3/6) |
9 years, 8 months |
ArmitageHacker |
metasploit, armitage, client-side attacks, remote exploits, trojans |
10619 |
9 |
33 |
 |
Metasploit And Armitage Training - Post Exploitation (4/6) |
9 years, 8 months |
ArmitageHacker |
armitage, meterpreter, metasploit, post-exploitation |
4550 |
1 |
34 |
 |
Metasploit And Armitage Training - Maneuver (5/6) |
9 years, 8 months |
ArmitageHacker |
armitage, metasploit, pass the hash, hashdump, pivoting |
5026 |
1 |
35 |
 |
Metasploit And Armitage Training - Team Tactics (6/6) |
9 years, 8 months |
ArmitageHacker |
armitage, metasploit, proxychains, pivoting, collaboration |
5826 |
7 |
36 |
 |
Metasploit 4.1 And Armitage: What's New? |
9 years, 6 months |
ArmitageHacker |
armitage, metasploit, gui, metasploit 4.1 |
6972 |
11 |
37 |
 |
Cross-Platform Java Exploit (Cve-2011-3544) Demonstration |
9 years, 4 months |
ArmitageHacker |
Java, cross-platform, exploit, demonstration, armitage, metasploit, CVE-2011-3544, applet |
8066 |
11 |
38 |
 |
Securitytube Metasploit Framework Expert ( Armitage ) |
9 years, 4 months |
ArmitageHacker |
amitage, metasploit, reconnaissance, exploitation, post-exploitation, demo, smfe |
39572 |
46 |
39 |
 |
Armitage For Metasploit 4.2 - What's New? |
9 years, 2 months |
ArmitageHacker |
armitage, metasploit, red team, collaboration |
4302 |
1 |
40 |
 |
Force Multipliers For Red Team Operations |
8 years, 8 months |
ArmitageHacker |
red team, process, collaboration, metasploit, armitage, ccdc |
2246 |
None |
41 |
 |
Scripting With Cortana - Cobalt Strike |
8 years, 8 months |
ArmitageHacker |
cortana, armitage, metasploit, scripting, automation |
3367 |
1 |
42 |
 |
Covert Vpn - Layer 2 Pivoting |
8 years, 7 months |
ArmitageHacker |
Cobalt Strike, Armitage, pivoting, vpn pivoting, meterpreter, post-exploitation |
3447 |
None |
43 |
 |
Beacon - Covert Command And Control For Cobalt Strike |
8 years, 6 months |
ArmitageHacker |
beaconing, malware, command and control, post-exploitation, APT, cobalt strike, armitage, C2, DNS, covert communication |
3185 |
None |
44 |
 |
Microsoft Word And Excel Macro Attack |
8 years, 4 months |
ArmitageHacker |
cobalt strike, armitage, metasploit, microsoft office, microsoft word, macro, VBA |
3939 |
1 |
45 |
 |
A Vision For Distributed Red Team Operations |
8 years, 2 months |
ArmitageHacker |
pen testing, collaboration, red team, distributed ops, scale, cobalt strike, armitage, team hacking |
2280 |
None |
46 |
 |
Command And Control Over Dns With Beacon |
7 years, 10 months |
ArmitageHacker |
dns, C2, covert channel, beacon, payload, Cobalt Strike, armitage |
3127 |
None |
47 |
 |
Dns And Http Pivoting With Cobalt Strike's Beacon |
7 years, 9 months |
ArmitageHacker |
|
2505 |
None |
48 |
 |
Cobalt Strike 1.47 - What's New? |
7 years, 8 months |
ArmitageHacker |
|
2207 |
None |
49 |
 |
Browser Pivoting (Two-Factor Auth? Hah!) |
7 years, 6 months |
ArmitageHacker |
|
2557 |
None |
50 |
 |
Tradecraft (1 Of 9) - Introduction |
7 years, 6 months |
ArmitageHacker |
cobalt strike, metasploit, metasploit framework, armitage, tradecraft, series |
2372 |
None |
51 |
 |
Tradecraft (2 Of 9) - Basic Exploitation (Hacking Circa 2003) |
7 years, 6 months |
ArmitageHacker |
tradecraft, series, cobalt strike, metasploit framework, beginner, exploits, ms08_067_netapi, ssh, pivoting, brute force |
2062 |
None |
52 |
 |
Tradecraft (3 Of 9) - Getting A Foothold |
7 years, 6 months |
ArmitageHacker |
tradecraft, series, cobalt strike, client-side attack, java signed applet, java exploit, system profiler, reconnaissance, phishing, spear phishing |
1908 |
None |
53 |
 |
Tradecraft (4 Of 9) - Social Engineering |
7 years, 6 months |
ArmitageHacker |
cobalt strike, tradecraft, series, spear phishing, watering hole attack, website clone, phishing site |
1904 |
None |
54 |
 |
Tradecraft (5 Of 9) - Post Exploitation With Beacon |
7 years, 6 months |
ArmitageHacker |
tradecraft, cobalt strike, series, beacon, beaconing, malware, low and slow, stealth, evasion, dns, covert communication |
2275 |
None |
55 |
 |
Tradecraft (6 Of 9) - Post Exploitation With Meterpreter |
7 years, 6 months |
ArmitageHacker |
cobalt strike, meterpreter, post-exploitation, pivot, privilege escalation, proxychains, browser pivoting, pivoting |
2076 |
None |
56 |
 |
Tradecraft (7 Of 9) - Lateral Movement |
7 years, 6 months |
ArmitageHacker |
tradecraft, cobalt strike, lateral movement, at, schtasks, sc, token stealing, access tokens, active directory, gpp, group policy preferences, mimikatz, hashdump, pass the hash, psexec, nltest, net view, windows |
2895 |
None |
57 |
 |
Tradecraft (8 Of 9) - Offense In Depth |
7 years, 6 months |
ArmitageHacker |
cobalt strike, tradecraft, application whitelisting, anti-virus, anti-virus evasion, payloads, payload staging, IDS, email spoofing, phishing, SPF, DKIM, DMARC, spam, anti-spam, egress, network access control, firewall |
2172 |
None |
58 |
 |
Tradecraft (9 Of 9) - Operations |
7 years, 6 months |
ArmitageHacker |
cobalt strike, collaboration, distributed operations, cortana, scripting, red team |
1798 |
None |
59 |
 |
Stealthy Peer-To-Peer Communication With Cobalt Strike's Beacon |
7 years, 5 months |
ArmitageHacker |
cobalt strike, beacon, peer to peer, P2P, stealth, persistence |
2889 |
None |
60 |
 |
Man-In-The-Browser Session Hijacking |
7 years, 4 months |
ArmitageHacker |
cobalt strike, browser pivoting, man-in-the-browser, two-factor authentication |
2434 |
None |
61 |
 |
Deliver Dns Trojan With Microsoft Office Macro |
7 years, 3 months |
ArmitageHacker |
|
1803 |
None |
62 |
 |
Privilege Escalation To Domain Admin And Lateral Movement |
7 years, 1 month |
ArmitageHacker |
|
2493 |
None |
63 |
 |
Bypass Uac On Windows 8.1 |
7 years, 1 month |
ArmitageHacker |
|
5733 |
1 |
64 |
 |
Covert Lateral Movement And Named Pipe Communication |
6 years, 11 months |
ArmitageHacker |
|
1191 |
None |
65 |
 |
Getting Beacon Past Http Proxy Authentication |
6 years, 11 months |
ArmitageHacker |
|
1326 |
None |