315 Red Team Tips
In Summary : Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Ou...
https://updatesinfosec.blogspot.com/2018/05/315-red-team-tips.html
In Summary :
Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Outlook.
Red tip #2: If the enemy SOC is using proxy logs for analysis. Guess what? It wont log cookies or POST body content as can be sensitive.
Red tip #3: Taking a snapshot of AD can let you browse, explore and formulate future attacks if access is lost momentarily. [...]
kindly refer the following link as follow up :
https://ift.tt/2Il19kP
Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Outlook.
Red tip #2: If the enemy SOC is using proxy logs for analysis. Guess what? It wont log cookies or POST body content as can be sensitive.
Red tip #3: Taking a snapshot of AD can let you browse, explore and formulate future attacks if access is lost momentarily. [...]
kindly refer the following link as follow up :
https://ift.tt/2Il19kP