Our articles - DEEP
Our articles
Anatomy of a Red-Team exercise - Chapter 2
Prior any actions, we focused on the payload crafting that will be used with our attack scenarios. We decided to go for PowerShell stageless reverse HTTPS payload that will be delivered using HTA dropper and then executed on the target machine.
Read this articlePublished on
20 April 2021
Social media – now a key sales channel
If you have something to sell, developing a presence on social media can prove to be a profitable strategy, whether you are targeting a B2B or B2C clientele. However, to use these channels successfully, you need to take a consistent approach and regularly share relevant content.
Read this articleAuthor
Béatrice SeiwertPublished on
06 April 2021
Anatomy of a Red-Team exercise - Chapter 1
A Red Team engagement can be shortly described as a real-life targeted attack simulation. As a threat actor, it uses a blended approach through several facets of social engineering, physical intrusion, application/network penetration testing, targeted phishing campaign… simultaneously to reach some pre-defined objectives.
Read this articlePublished on
22 March 2021
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expertOur experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?