Loading...

Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer

In Summary : Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the...

In Summary :

Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop of the client or to try and connect our own laptop to the network (though they did have a Network Access Control system in place). This blog posts lists out our attempts to overcome the security controls, escalate our privileges, and move through the network, while at the same time ensuring that the SOC does not pick up our activities [...]

kindly refer the following link as follow up :
https://ift.tt/2IzPPgM

Post a Comment

emo-but-icon

Home item

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats