Advanced Penetration Testing & APT Modelling
- Discover and create attack vectors.
- Move unseen through a target enterprise and reconnoiter networks, operating systems, and test structures.
- Employ social engineering strategies to create an initial compromise.
- Establish a beachhead and leave a robust command-and-control structure in place.
- Use advanced data exfiltration techniques – even against targets without direct Internet connections.
- Utilize advanced methods for escalating privilege.
- Infiltrate deep into networks and operating systems using harvested credentials.
- Create custom code using VBA, Windows® Scripting Host, C, Java®, JavaScript®, Flash, and more.
Post a Comment