Technical Corner

Anatomy of a Red-Team exercise - Chapter 3

As discussed in previous scenario, we prepared several raspberry devices with a 4G modem, allowing us to remotely control the device without requiring being in proximity for operation.

Read this article

Published on

29 June 2021

Anatomy of a Red-Team exercise - Chapter 2

Prior any actions, we focused on the payload crafting that will be used with our attack scenarios. We decided to go for PowerShell stageless reverse HTTPS payload that will be delivered using HTA dropper and then executed on the target machine.

Read this article

Published on

20 April 2021

Anatomy of a Red-Team exercise - Chapter 1

A Red Team engagement can be shortly described as a real-life targeted attack simulation. As a threat actor, it uses a blended approach through several facets of social engineering, physical intrusion, application/network penetration testing, targeted phishing campaign… simultaneously to reach some pre-defined objectives.

Read this article

Published on

22 March 2021

Contact us

Do you have any questions about an article? Do you need help solving your IT issues? 

Contact an expert

Our experts answer your questions

Do you have any questions about an article? Do you need help solving your IT issues?