HackPathHackPath
CoursesRoadmapPracticePricing

Course

C2 & Post-Exploitation

Understand C2 architectures, practice post-exploitation and pivoting, and learn the fundamentals of persistence and tunneling.

Structured path preview

1 free lesson to get started, then 11 premium lessons with exercises, scenarios, and detailed solutions.

First locked checkpoint: Listener / Agent / Teamserver Architecture

Start free lessonUnlock Full Access

Lessons

12

Completed

0

Progress

0%

Lessons

Understanding C2

Lesson 01

What is a C2?

Free

Lesson 02

Listener / Agent / Teamserver Architecture

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Advanced Metasploit

Lesson 01

Advanced Meterpreter

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Metasploit Post-Exploitation Modules

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 03

Pivoting with Metasploit

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Cobalt Strike concepts

Lesson 01

Beacon and Listeners — C2 Concepts

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Malleable C2 Profiles

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Persistence

Lesson 01

Windows Persistence

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Linux Persistence

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock
Pivoting & Tunneling

Lesson 01

SSH Port Forwarding

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 02

Proxychains and SOCKS

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock

Lesson 03

Chisel and ligolo-ng

Members only

Unlock exercises, detailed solutions, and the next steps.

Unlock