Get to Know Cobalt Strike: New Introductory Training

We’re excited to announce the launch of a brand-new Cobalt Strike training course, created in collaboration between Fortra and Zero-Point Security. This unique partnership brings together the expertise of Cobalt Strike’s team with the field-tested training experience of Zero-Point Security to deliver an unmatched learning opportunity. Through this course users can learn how to use […]

Read More… from Get to Know Cobalt Strike: New Introductory Training

Dynamically Instrumenting Beacon With BeaconGate – For All Your Call Stack Spoofing Needs!

TL;DR: In this blog we’ll demonstrate how to instrument Beacon via BeaconGate and walk through our implementations of return address spoofing, indirect syscalls, and a call stack spoofing technique, Draugr, that are now available in Sleepmask-VS. Furthermore, we’ll provide tips and tricks for developers in getting set up with Sleepmask-VS so they can write their […]

Read More… from Dynamically Instrumenting Beacon With BeaconGate – For All Your Call Stack Spoofing Needs!

Fortra Cobalt Strike Demo Session – May 2025

Join a technical walkthrough of Cobalt Strike’s advanced capabilities for post-exploitation and adversary simulation. In the session, Cobalt Strike developers and researchers will demonstrate usage of the product and show the advanced evasion and customization of Cobalt Strike through hands-on demos. The session will be presented by Cobalt Strike product team members Pieter Ceelen and […]

Read More… from Fortra Cobalt Strike Demo Session – May 2025

Red Team Use Case: Government Agency

Background A government agency responsible for critical public services commissions a Red Team engagement to assess its cybersecurity resilience. The exercise simulates an advanced persistent threat (APT) attack, testing the agency’s ability to detect, respond to, and mitigate cyber threats targeting sensitive government data, public infrastructure, and national security.  Phase 1: Initial Access Operations  The […]

Read More… from Red Team Use Case: Government Agency

Red Team Use Case: Financial Institution

Background  A large financial institution conducts an assumed breach exercise to test its cybersecurity resilience. The Red Team is tasked with simulating an advanced persistent threat (APT) attack, while the Blue Team monitors, detects, and mitigates threats in real-time.  Phase 1: Initial Access Operations  The Red Team conducts reconnaissance on the Financial Institution’s employees using […]

Read More… from Red Team Use Case: Financial Institution

Red Team Use Case: Healthcare

Background A regional hospital network conducts a Red Team engagement to evaluate its cybersecurity defenses. The exercise aims to simulate a sophisticated cyberattack targeting patient data, medical devices, and critical infrastructure, testing the hospital’s ability to detect, respond to, and recover from an intrusion.  Phase 1: Initial Access Operations  The Red Team begins by gathering […]

Read More… from Red Team Use Case: Healthcare