HackPath
CoursesRoadmapPracticePricing
>_
HackerPath

C2 & Post-Exploitation

0%
Lessons
Comprendre les C2
01What is a C2?
40 min
02Listener / Agent / Teamserver Architecture
45 min
Metasploit avancé
03Advanced Meterpreter
50 min
04Metasploit Post-Exploitation Modules
48 min
05Pivoting with Metasploit
55 min
Cobalt Strike concepts
06Beacon and Listeners — C2 Concepts
45 min
07Malleable C2 Profiles
52 min
Persistance
08Windows Persistence
58 min
09Linux Persistence
52 min
Pivoting & Tunneling
10SSH Port Forwarding
44 min
11Proxychains and SOCKS
48 min
12Chisel and ligolo-ng
60 min
Need help?Email support

Lesson 08

Windows Persistence

Discover common Windows persistence mechanisms (registry, scheduled tasks, services) and their traces.

Locked lesson

This lesson is reserved for members. Upgrade to unlock the full course.

Upgrade