Video Library

The following topics from the preceding chapters contain supplemental video content:

The Artifact Kit

Beacon Covert Peer-to-Peer Communication

Beacon Object Files

How Browser Pivoting Works

Clone a Site

Credentials

DNS Beacon

Elevate with an Exploit

Elevate with Known Credentials

Exercising Caution with Malleable C2

External C2

File Browser

Foreign Listeners

HTML Application

HTTP Beacon and HTTPS Beacon

Initial Access

Lateral Movement GUI

Metasploit

MS Office Macro

Payload Generator

Pivot Listeners

Port Scanning

Privilege Escalation

Process Browser

Proxychains

The Resource Kit

Running Commands

Scripting Cobalt Strike

Services

SOCKS Pivoting and Reverse Port Forwards

Spear Phishing

Starting the Team Server

TCP Beacon

Trust Relationships

Upload and Download Files

Wayland Desktop - Not Supported

Windows Executable (Stageless)