HackPath
CoursesRoadmapPracticePricing
>_
HackerPath

C2 & Post-Exploitation

0%
Lessons
Comprendre les C2
01What is a C2?
40 min
02Listener / Agent / Teamserver Architecture
45 min
Metasploit avancé
03Advanced Meterpreter
50 min
04Metasploit Post-Exploitation Modules
48 min
05Pivoting with Metasploit
55 min
Cobalt Strike concepts
06Beacon and Listeners — C2 Concepts
45 min
07Malleable C2 Profiles
52 min
Persistance
08Windows Persistence
58 min
09Linux Persistence
52 min
Pivoting & Tunneling
10SSH Port Forwarding
44 min
11Proxychains and SOCKS
48 min
12Chisel and ligolo-ng
60 min
Need help?Email support

Lesson 05

Pivoting with Metasploit

Understand and practice pivoting with Metasploit: routes, proxy, and access to internal segments.

Locked lesson

This lesson is reserved for members. Upgrade to unlock the full course.

Upgrade