Home » Tools » 9. Post-Exploitation Tools » 3. Cobalt Strike

3. Cobalt Strike

Description:
Cobalt Strike is a post-exploitation tool that provides adversary simulation capabilities. It allows attackers to create beacons, launch attacks, pivot within networks, and exfiltrate data.

Examples:

    1. Create a Beacon:
      • Create a Windows executable beacon that connects back to the attacker’s server. Explanation: Beacons are used to maintain persistent access and provide the ability to execute commands on compromised hosts.
Scroll to Top