1 |
|
Mimikatz 2.0 Kerberos Golden Ticket Tutorial |
9 years, 10 months |
ArmitageHacker |
|
4458 |
None |
2 |
|
Malleable Command And Control |
9 years, 8 months |
ArmitageHacker |
|
2679 |
None |
3 |
|
Use Cobalt Strike's Payloads With Veil's Evasion |
9 years, 8 months |
ArmitageHacker |
|
3145 |
None |
4 |
|
Pass-The-[Golden]-Ticket With Cobalt Strike's Beacon |
9 years, 7 months |
ArmitageHacker |
|
3611 |
None |
5 |
|
Putter Panda - Threat Replication Case Study |
9 years, 7 months |
ArmitageHacker |
|
3449 |
None |
6 |
|
String Of Paerls - Threat Replication Case Study |
9 years, 7 months |
ArmitageHacker |
|
2988 |
None |
7 |
|
Energetic Bear / Crouching Yeti / Dragonfly - Threat Replication Case Study |
9 years, 7 months |
ArmitageHacker |
|
3660 |
None |
8 |
|
Vpn Pivoting With Cobalt Strike |
9 years, 6 months |
ArmitageHacker |
|
3376 |
None |
9 |
|
Html Application Social Engineering Attack |
9 years, 6 months |
ArmitageHacker |
|
3173 |
None |
10 |
|
Setup A Cobalt Strike Team Server In Amazon's Ec2 |
9 years, 6 months |
ArmitageHacker |
|
3663 |
None |
11 |
|
Powershell Post-Exploitation With Cobalt Strike's Beacon |
9 years, 6 months |
ArmitageHacker |
|
3456 |
None |
12 |
|
Vpn Pivoting Over Icmp |
9 years, 4 months |
ArmitageHacker |
|
2877 |
1 |
13 |
|
Advanced Threat Tactics 2015 - (1/9) Operations |
8 years, 5 months |
ArmitageHacker |
|
2913 |
None |
14 |
|
Advanced Threat Tactics 2015 - (2/9) Infrastructure |
8 years, 5 months |
ArmitageHacker |
|
2864 |
None |
15 |
|
Advanced Threat Tactics 2015 - (3/9) Targeted Attacks |
8 years, 5 months |
ArmitageHacker |
|
2992 |
None |
16 |
|
Advanced Threat Tactics 2015 - (4/9) Post Exploitation |
8 years, 5 months |
ArmitageHacker |
|
3544 |
None |
17 |
|
Advanced Threat Tactics 2015 - (5/9) Privilege Escalation |
8 years, 5 months |
ArmitageHacker |
|
3359 |
None |
18 |
|
Advanced Threat Tactics 2015 - (6/9) Lateral Movement |
8 years, 5 months |
ArmitageHacker |
|
3266 |
None |
19 |
|
Advanced Threat Tactics 2015 - (7/9) Pivoting |
8 years, 5 months |
ArmitageHacker |
|
3346 |
None |
20 |
|
Advanced Threat Tactics 2015 - (8/9) Malleable Command And Control |
8 years, 5 months |
ArmitageHacker |
|
3302 |
None |
21 |
|
Advanced Threat Tactics 2015 - (9/9) Evasion |
8 years, 5 months |
ArmitageHacker |
|
3303 |
None |
22 |
|
Multi-Player Metasploit -- Realized |
13 years |
ArmitageHacker |
metasploit, armitage, collaboration, red team, network attack |
5977 |
4 |
23 |
|
Armitage @ Reverse Space |
13 years |
ArmitageHacker |
collaboration, armitage, metasploit, red team, tutorial, getting started |
5558 |
2 |
24 |
|
Penetration Testing With Armitage |
12 years, 12 months |
ArmitageHacker |
armitage, metasploit |
7977 |
4 |
25 |
|
Armitage Introduction 101 |
12 years, 11 months |
ArmitageHacker |
armitage, 101, metasploit |
6793 |
3 |
26 |
|
Armitage For Metasploit On Fox's Breaking In |
12 years, 10 months |
ArmitageHacker |
armitage, metasploit, cameo, Fox, breaking in, breakingin, television, pop culture |
5875 |
1 |
27 |
|
Network Attack Collaboration And Meterpreter Session Sharing |
12 years, 8 months |
ArmitageHacker |
red team, collaboration, data sharing, metasploit, session sharing, meterpreter |
6219 |
3 |
28 |
|
Armitage Multi-Player Mode (For Metasploit) Demonstration |
12 years, 8 months |
ArmitageHacker |
armitage, red team, collaboration, metasploit |
6365 |
3 |
29 |
|
Metasploit 4.0 And Armitage - What's New? |
12 years, 7 months |
ArmitageHacker |
armitage, metasploit, meterpreter, metasploit 4, metasploit 4.0 |
8124 |
1 |
30 |
|
Metasploit And Armitage Training - Introduction (1/6) |
12 years, 7 months |
ArmitageHacker |
metasploit, armitage, penetration testing |
10076 |
2 |
31 |
|
Metasploit And Armitage Training - Metasploit (2/6) |
12 years, 7 months |
ArmitageHacker |
metasploit, meterpreter, armitage |
6514 |
3 |
32 |
|
Metasploit And Armitage Training - Access (3/6) |
12 years, 7 months |
ArmitageHacker |
metasploit, armitage, client-side attacks, remote exploits, trojans |
12433 |
9 |
33 |
|
Metasploit And Armitage Training - Post Exploitation (4/6) |
12 years, 7 months |
ArmitageHacker |
armitage, meterpreter, metasploit, post-exploitation |
6114 |
1 |
34 |
|
Metasploit And Armitage Training - Maneuver (5/6) |
12 years, 7 months |
ArmitageHacker |
armitage, metasploit, pass the hash, hashdump, pivoting |
6663 |
1 |
35 |
|
Metasploit And Armitage Training - Team Tactics (6/6) |
12 years, 7 months |
ArmitageHacker |
armitage, metasploit, proxychains, pivoting, collaboration |
7564 |
7 |
36 |
|
Metasploit 4.1 And Armitage: What's New? |
12 years, 5 months |
ArmitageHacker |
armitage, metasploit, gui, metasploit 4.1 |
8819 |
11 |
37 |
|
Cross-Platform Java Exploit (Cve-2011-3544) Demonstration |
12 years, 3 months |
ArmitageHacker |
Java, cross-platform, exploit, demonstration, armitage, metasploit, CVE-2011-3544, applet |
10229 |
11 |
38 |
|
Securitytube Metasploit Framework Expert ( Armitage ) |
12 years, 3 months |
ArmitageHacker |
amitage, metasploit, reconnaissance, exploitation, post-exploitation, demo, smfe |
42633 |
46 |
39 |
|
Armitage For Metasploit 4.2 - What's New? |
12 years |
ArmitageHacker |
armitage, metasploit, red team, collaboration |
5673 |
1 |
40 |
|
Force Multipliers For Red Team Operations |
11 years, 7 months |
ArmitageHacker |
red team, process, collaboration, metasploit, armitage, ccdc |
3744 |
None |
41 |
|
Scripting With Cortana - Cobalt Strike |
11 years, 7 months |
ArmitageHacker |
cortana, armitage, metasploit, scripting, automation |
4826 |
1 |
42 |
|
Covert Vpn - Layer 2 Pivoting |
11 years, 6 months |
ArmitageHacker |
Cobalt Strike, Armitage, pivoting, vpn pivoting, meterpreter, post-exploitation |
4941 |
None |
43 |
|
Beacon - Covert Command And Control For Cobalt Strike |
11 years, 5 months |
ArmitageHacker |
beaconing, malware, command and control, post-exploitation, APT, cobalt strike, armitage, C2, DNS, covert communication |
4821 |
None |
44 |
|
Microsoft Word And Excel Macro Attack |
11 years, 3 months |
ArmitageHacker |
cobalt strike, armitage, metasploit, microsoft office, microsoft word, macro, VBA |
5540 |
1 |
45 |
|
A Vision For Distributed Red Team Operations |
11 years, 1 month |
ArmitageHacker |
pen testing, collaboration, red team, distributed ops, scale, cobalt strike, armitage, team hacking |
3750 |
None |
46 |
|
Command And Control Over Dns With Beacon |
10 years, 9 months |
ArmitageHacker |
dns, C2, covert channel, beacon, payload, Cobalt Strike, armitage |
4837 |
None |
47 |
|
Dns And Http Pivoting With Cobalt Strike's Beacon |
10 years, 8 months |
ArmitageHacker |
|
3753 |
None |
48 |
|
Cobalt Strike 1.47 - What's New? |
10 years, 7 months |
ArmitageHacker |
|
3346 |
None |
49 |
|
Browser Pivoting (Two-Factor Auth? Hah!) |
10 years, 5 months |
ArmitageHacker |
|
3756 |
None |
50 |
|
Tradecraft (1 Of 9) - Introduction |
10 years, 5 months |
ArmitageHacker |
cobalt strike, metasploit, metasploit framework, armitage, tradecraft, series |
4098 |
None |
51 |
|
Tradecraft (2 Of 9) - Basic Exploitation (Hacking Circa 2003) |
10 years, 5 months |
ArmitageHacker |
tradecraft, series, cobalt strike, metasploit framework, beginner, exploits, ms08_067_netapi, ssh, pivoting, brute force |
3560 |
None |
52 |
|
Tradecraft (3 Of 9) - Getting A Foothold |
10 years, 5 months |
ArmitageHacker |
tradecraft, series, cobalt strike, client-side attack, java signed applet, java exploit, system profiler, reconnaissance, phishing, spear phishing |
3276 |
None |
53 |
|
Tradecraft (4 Of 9) - Social Engineering |
10 years, 5 months |
ArmitageHacker |
cobalt strike, tradecraft, series, spear phishing, watering hole attack, website clone, phishing site |
3221 |
None |
54 |
|
Tradecraft (5 Of 9) - Post Exploitation With Beacon |
10 years, 5 months |
ArmitageHacker |
tradecraft, cobalt strike, series, beacon, beaconing, malware, low and slow, stealth, evasion, dns, covert communication |
3763 |
None |
55 |
|
Tradecraft (6 Of 9) - Post Exploitation With Meterpreter |
10 years, 5 months |
ArmitageHacker |
cobalt strike, meterpreter, post-exploitation, pivot, privilege escalation, proxychains, browser pivoting, pivoting |
3562 |
None |
56 |
|
Tradecraft (7 Of 9) - Lateral Movement |
10 years, 5 months |
ArmitageHacker |
tradecraft, cobalt strike, lateral movement, at, schtasks, sc, token stealing, access tokens, active directory, gpp, group policy preferences, mimikatz, hashdump, pass the hash, psexec, nltest, net view, windows |
4576 |
None |
57 |
|
Tradecraft (8 Of 9) - Offense In Depth |
10 years, 5 months |
ArmitageHacker |
cobalt strike, tradecraft, application whitelisting, anti-virus, anti-virus evasion, payloads, payload staging, IDS, email spoofing, phishing, SPF, DKIM, DMARC, spam, anti-spam, egress, network access control, firewall |
3616 |
None |
58 |
|
Tradecraft (9 Of 9) - Operations |
10 years, 5 months |
ArmitageHacker |
cobalt strike, collaboration, distributed operations, cortana, scripting, red team |
3198 |
None |
59 |
|
Stealthy Peer-To-Peer Communication With Cobalt Strike's Beacon |
10 years, 4 months |
ArmitageHacker |
cobalt strike, beacon, peer to peer, P2P, stealth, persistence |
4645 |
None |
60 |
|
Man-In-The-Browser Session Hijacking |
10 years, 3 months |
ArmitageHacker |
cobalt strike, browser pivoting, man-in-the-browser, two-factor authentication |
3858 |
None |
61 |
|
Deliver Dns Trojan With Microsoft Office Macro |
10 years, 2 months |
ArmitageHacker |
|
2610 |
None |
62 |
|
Privilege Escalation To Domain Admin And Lateral Movement |
10 years |
ArmitageHacker |
|
3341 |
None |
63 |
|
Bypass Uac On Windows 8.1 |
10 years |
ArmitageHacker |
|
6759 |
1 |
64 |
|
Covert Lateral Movement And Named Pipe Communication |
9 years, 10 months |
ArmitageHacker |
|
1962 |
None |
65 |
|
Getting Beacon Past Http Proxy Authentication |
9 years, 10 months |
ArmitageHacker |
|
2109 |
None |