-
for first, start with install the jdk-8u271 for your environment (list of compatible versions can be found also in the url below).
-
official site oracle jdk: => https://www.oracle.com/java/technologies/javase/javase8u211-later-archive-downloads.html
-
password to extract cobaltstrike after downloading = MalwareAnalysis_4d5a
-
start with official pdf cobalt strike .pdf
-
The Teamserver compatible to AWS as well.
-
To deploy the software on AWS, this compatible just for Ubuntu 12.02 and 14.04(checked on AWS cloudfront service, PoC image below)!!!
-
the next url very useful, it will present all of the domain fronting techniques, include content delivery networks, privilage escalations, hooking and more ways execute the injection directly through The DNS, http, https. loaded redirect a payload, powershell commands etc.
-
to discover and research after injection(post exploitation), you must to use with volatility tool acctually to find and create incident response :) Domain Fronting guide: => https://www.bamsoftware.com/papers/fronting/
-
i wish you get lots of permissions.