Loading...

315 Red Team Tips

In Summary : Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Ou...

In Summary :

Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Outlook.
Red tip #2: If the enemy SOC is using proxy logs for analysis. Guess what? It wont log cookies or POST body content as can be sensitive.
Red tip #3: Taking a snapshot of AD can let you browse, explore and formulate future attacks if access is lost momentarily. [...]

kindly refer the following link as follow up :
https://ift.tt/2Il19kP



Post a Comment

emo-but-icon

Home item

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats