HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackPath

C2 & Post-Exploitation

0%
Lessons
Understanding C2
01What is a C2?
40 min
02Listener / Agent / Teamserver Architecture
45 min
Advanced Metasploit
03Advanced Meterpreter
50 min
04Metasploit Post-Exploitation Modules
48 min
05Pivoting with Metasploit
55 min
Cobalt Strike concepts
06Beacon and Listeners — C2 Concepts
45 min
07Malleable C2 Profiles
52 min
Persistence
08Windows Persistence
58 min
09Linux Persistence
52 min
Pivoting & Tunneling
10SSH Port Forwarding
44 min
11Proxychains and SOCKS
48 min
12Chisel and ligolo-ng
60 min

Lesson 05

Pivoting with Metasploit

Understand and practice pivoting with Metasploit: routes, proxy, and access to internal segments.

Locked lesson

This lesson is reserved for members. Upgrade to unlock the full course.

Unlock Premium Access →

200+ lessons • Challenges • Flashcards • $9/month

11 lessons locked in this course · 800+ students enrolled

$99/year — save 31% vs monthly

Unlock full access →