Welcome! This foundational course is a collaboration between Zero Point Security and Cobalt Strike, designed to provide a hands-on, detailed introduction to Cobalt Strike.
Through direct application of the framework, you will gain experience in everything from initial setup and basic command usage to advanced post-exploitation, bypassing network filters, and customizing the tool’s behavior. The focus is on building practical skills that can be immediately applied in a professional environment.
By the end of this self-paced course, you will feel comfortable using Cobalt Strike across all stages of the attack chain and be able to customize it to meet specific operational requirements for red team assessments and adversary simulations.
Cobalt Strike Introduction Course Outline
This module-based tour of the Cobalt Strike framework covers the entire lifecycle of a red team engagement through written explanations, graphics, and videos. The course covers:
Getting Started
Dive into the methodology for red teaming and adversary simulation.
- Introduction to Red Teaming
- Adversary Emulation vs. Simulation
- The Attack Lifecycle
Initial Setup
Master the fundamental command-line interface for the framework.
- First Time Setup
- Client Tour
- Command Basics
- Getting to Know the Cobalt Strike Client
- Aggressor Script
- Home Lab
Command and Control (C2)
Learn to use various types of Beacons.
- HTTP/HTTPS
- DNS Beacons
- Stealthy Network Comms with DNS over HTTPS Beacon
- DNS over HTTPS Beacons
- TCP and SMB Beacons
- External C2
Code Execution
Understand Cobalt Strike payload generation and execution.
- Reflective Loading
- Staged vs. Stageless Payloads
- Payload Guardrails
- Resource Kit
- Artifact Kit
- Custom Payloads
- Cobalt Strike’s Built-In Web Server
Post-Exploitation
Develop proficiency with post-exploitation commands.
- Command Behavior
- File System & File Browser
- Processes & Process Browser
- Keylogger & Clipboard
- Registry
- Screenshots
- VNC
- Domain Reconnaissance
- Execution Commands
- Executing Custom Tools
- Beacon Object Files (BOFs)
- Beacon Data Store
Privilege Escalation
Learn about the built-in options and techniques Cobalt Strike offers for elevating privileges.
- UAC Bypasses
- Get SYSTEM
Credentials and Lateral Movement
Discover how Cobalt Strike leverages built-in Windows authentication technologies to remotely authenticate to other targets and get administrative access to move laterally across a network.
- Credential Access
- Credentials Model
- User Impersonation
- Lateral Movement
Bypassing Network Filtering
Get an overview of techniques for bypassing network restrictions.
- SOCKS Proxy
- Reverse Port Forward
- Pivot Listeners
Malleable C2
Customize Beacon’s indicators and behaviors to transform the appearance of Beacon’s network traffic to appear legitimate or benign.
- Customizing HTTP Traffic
- Customizing DNS Traffic
- Profile Variants
- Host Profiles
- HTTPS Certificates
- Code Signing
Malleable C2 (Beacon)
Configure Beacon’s default reflective loading process to make it emulate a known threat or bypass AV and EDR signatures.
- Beacon’s Reflective Loader
- Beacon’s Runtime Behavior
- Controlling Post Exploitation
- Malleable Profile Configuration
Extending Cobalt Strike
Learn to extend the framework with Aggressor Script to create additional functionality to tailor engagements to each specific environment.
- Aggressor Functions
- Custom Elevators
- Custom Lateral Movement
- Custom Dialogs
- Command Callbacks
Reporting
Find out about how the raw data logs from engagements can be transformed into reports detailing activity, hosts, indicators of compromise, and more.
- Reporting
- Custom Report Templates
PRODUCT SUMMARY
Key Features
- 85 lessons
- Hands-on Labs: The curriculum is reinforced with a series of interactive labs designed to solidify core concepts at your own pace, providing a realistic learning experience.
- Format: Self-paced, online
FAQ
Is Lab access included with the course?
- Yes, lab access is included with the course to hone your skills at your own pace.
Do the labs support multiple geographical regions?
- Yes, your IP address is used to determine the best delivery region for the lab instance. The available regions are: London, Ashburn, Seattle, Veritas, and Singapore. If a VPN is used while launching a lab, the instance will be geolocated to the country the VPN is configured for. You should also expect this to negatively impact the lab’s performance.
Ready to Sign Up?
For more information on training and to get started, contact our experts.