HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackPath

C2 & Post-Exploitation

0%
Lessons
Understanding C2
01What is a C2?
40 min
02Listener / Agent / Teamserver Architecture
45 min
Advanced Metasploit
03Advanced Meterpreter
50 min
04Metasploit Post-Exploitation Modules
48 min
05Pivoting with Metasploit
55 min
Cobalt Strike concepts
06Beacon and Listeners — C2 Concepts
45 min
07Malleable C2 Profiles
52 min
Persistence
08Windows Persistence
58 min
09Linux Persistence
52 min
Pivoting & Tunneling
10SSH Port Forwarding
44 min
11Proxychains and SOCKS
48 min
12Chisel and ligolo-ng
60 min

Lesson 08

Windows Persistence

Discover common Windows persistence mechanisms (registry, scheduled tasks, services) and their traces.

Locked lesson

This lesson is reserved for members. Upgrade to unlock the full course.

Unlock Premium Access →

200+ lessons • Challenges • Flashcards • $9/month

11 lessons locked in this course · 800+ students enrolled

$99/year — save 31% vs monthly

Unlock full access →