B1JD3L
03-19-2015, 09:04 AM
http://www.advancedpentest.com/images/screenshots/homepage_th.jpg
Cobalt Strike is threat emulation software. Execute targeted attacks against modern enterprises with one of the most powerful network attack kits available to penetration testers. This is not compliance testing.
Reconnaissance
Cobalt Strike's system profiler discovers which client-side applications your target uses, with version information. Use its results to pick a client-side exploit or set it up to automatically serve an attack.
Attack Packages
Use Cobalt Strike to host a web drive-by attack or transform an innocent file into a trojan horse.
Java Applet Attacks
Microsoft Office Documents
Microsoft Windows Programs
USB drives
Website Clone Tool
Spear phishing
Import a message and let Cobalt Strike replace links and text to build a convincing phish for you. Cobalt Strike sends email and tracks who clicks.
Collaboration
Connect to a Cobalt Strike team server to share data, communicate in real-time, and control systems compromised during the engagement.
Covert Payload
Beacon is Cobalt Strike's payload for red team operations. Beacon executes commands, logs keystrokes, downloads files, and spawns other payloads. Beacon's network indicators are malleable. Load a C2 profile to look like an APT. Beacon calls home on set intervals and uses HTTP and DNS to evade egress restrictions.
Post Exploitation
Cobalt Strike's scriptable and easy to use GUI allows your team to control desktops, download files, and pivot through compromised systems.
Browser Pivoting
http://www.advancedpentest.com/images/screenshots/filebrowser_th.jpg
Use a Browser Pivot to go around two-factor authentication and access sites as your target.
Reporting
Cobalt Strike captures every action for reporting purposes. Reports are available as both PDF and MS Word documents. Cobalt Strike reports:
reconstruct your engagement timeline;
organize findings on a host-by-host basis;
list exploited remote vulnerabilities;
document client-side vulnerabilities;
show phishing activity, including clicks.
Download : http://www.datafilehost.com/d/e77d61c7
http://i.imgur.com/9TZslF7.png
Cobalt Strike is threat emulation software. Execute targeted attacks against modern enterprises with one of the most powerful network attack kits available to penetration testers. This is not compliance testing.
Reconnaissance
Cobalt Strike's system profiler discovers which client-side applications your target uses, with version information. Use its results to pick a client-side exploit or set it up to automatically serve an attack.
Attack Packages
Use Cobalt Strike to host a web drive-by attack or transform an innocent file into a trojan horse.
Java Applet Attacks
Microsoft Office Documents
Microsoft Windows Programs
USB drives
Website Clone Tool
Spear phishing
Import a message and let Cobalt Strike replace links and text to build a convincing phish for you. Cobalt Strike sends email and tracks who clicks.
Collaboration
Connect to a Cobalt Strike team server to share data, communicate in real-time, and control systems compromised during the engagement.
Covert Payload
Beacon is Cobalt Strike's payload for red team operations. Beacon executes commands, logs keystrokes, downloads files, and spawns other payloads. Beacon's network indicators are malleable. Load a C2 profile to look like an APT. Beacon calls home on set intervals and uses HTTP and DNS to evade egress restrictions.
Post Exploitation
Cobalt Strike's scriptable and easy to use GUI allows your team to control desktops, download files, and pivot through compromised systems.
Browser Pivoting
http://www.advancedpentest.com/images/screenshots/filebrowser_th.jpg
Use a Browser Pivot to go around two-factor authentication and access sites as your target.
Reporting
Cobalt Strike captures every action for reporting purposes. Reports are available as both PDF and MS Word documents. Cobalt Strike reports:
reconstruct your engagement timeline;
organize findings on a host-by-host basis;
list exploited remote vulnerabilities;
document client-side vulnerabilities;
show phishing activity, including clicks.
Download : http://www.datafilehost.com/d/e77d61c7
http://i.imgur.com/9TZslF7.png