Cobaltstrike tutorial series (four) - the menu bar with a view

0x000- preamble

Cobaltstrike series of tutorials (a) Introduction and Installation
https://www.cnblogs.com/ssw6/p/12091411.html

Cobaltstrike series of tutorials (b) Listner and Payload generation
https://www.cnblogs.com/ssw6/p/12091506.html

Cobaltstrike series of tutorials (c) beacon Detailed
https://www.cnblogs.com/ssw6/p/12091635.html

0x001-Cobaltstrike menu bar

 

 

0x002-Cobaltstrike view

① Menu 4: Pivot Graph (topology)

As shown, this view can clearly see the relationship between hosts, the view is very intuitive and practical for large-scale network in the permeate and APT

 

 

② menu 5: Session Table (a list of conversations)

This view of our penetration test most commonly used, he mainly shows all the rights of the current session, the session, the session running on the target machine, etc. pid of
choice right-session, there will be a lot of functions

 

 

 

 

③ Menu 6: Target Table (target list)

 This is shown at the host survival of viable after scanning host / port scanning, is performed in the beacon detected in.

 

 In this view, select the right target

 

 As shown, cs can log on to the target host (conducted within the network lateral movement) using a variety of ways, if multiple servers using the same credentials, we can use this function to hash pass, scored more than one server permissions
, of course, its also with a port scanning feature, you can scan ports specified host.

Guess you like

Origin www.cnblogs.com/ssw6/p/12095056.html