Please enable JavaScript.
Coggle requires JavaScript to display documents.
CobaltStrike (Post Exploitation (Lateral Movement (BOF-wmi/psexec, agg…
CobaltStrike
Getting Foothold
Client-side system profiler
CS web services
User Driven attack packages
HTML App
MS Office Macro
Payload Gen
Windows Executable s
Hosting Files
User Driven Web Drive-By Attacks
Java Signed Applet Attack
Java Smart Applet Attack
Scripted Web Delivery
Client Side Exploits
Clone site
Spear Phishing
targets
Templates
Sending messages
Post Exploitation
Beacon Console
Beacon Menu
Async & Interactive op
session passing
alternate parent process
spoof process arguments
blocking dlls in child process
upload & download
file browser
file system commands
windows registry
keystrokes and screenshots
process browser
desktop control
Lateral Movement
BOF-wmi/psexec
agg-scripts
Privilege Escalation
elevate with exploit
BOF-Async-loading-exploits
Agg-scripts
get system
UAC bypass
MIMIkatz
credentials and hash harvesting
network and host enum
winpeas/linepease or lineenum
Trust relation
Kerbrose Tickets
pivoting
Browser Pivoting
SOCKS Proxy
Proxy Chain
Metasploit
Reverse Port Forward
pivot Listeners
Covert VPN
SSH Sessions
SSH client
running commands
Upload and Download files
peer to peer C2
SOCKS pivoting and reverse port forwarders
created by abdul_basit