Mohan reddyCatastrophic Perception over internet 🌐Typically Truth is what we love to hear or see, but we tend to (or) unknowingly ignore, But that truth which you need to know, you ignores…Oct 28, 2020Oct 28, 2020
Mohan reddyinRedteam & Blueteam SeriesFind Suspicious activityType of suspicious activitiesMay 4, 2020May 4, 2020
Mohan reddyinRedteam & Blueteam SeriesMaintain Remote access without a C2As malware writers attempt to make their malware more resilient to take-down attempts and detection, there are a number of trends that we…May 4, 2020May 4, 2020
Mohan reddyinRedteam & Blueteam SeriesExfiltrate Sensitive DataData exfiltration is an unauthorized copying, transferring or retrieval of data from a source. The attacker can exfiltrate the data…May 4, 2020May 4, 2020
Mohan reddyinRedteam & Blueteam SeriesFind and Access Sensitive DataRansomware, insider threat and denial of service are considered the top threats to sensitive data by recent SANS Data Protection Survey…May 4, 2020May 4, 2020
Mohan reddyinRedteam & Blueteam SeriesEscalate Domain privilegesMany of the methods for gaining domain administrative privileges are the same as or similar to those used to gain local administrative…May 4, 20202May 4, 20202
Mohan reddyinRedteam & Blueteam SeriesLateral MovementThe number and complexity of cyber-attacks are ceaselessly increasing while the existing security measures is far lagging in detecting…May 3, 2020May 3, 2020
Mohan reddyinRedteam & Blueteam SeriesPerform Network Reconnaissance/DiscoveryThe process for internal reconnaissance is the same as the initial reconnaissance step in the cyber kill chain. However, more detailed…May 3, 2020May 3, 2020
Mohan reddyinRedteam & Blueteam SeriesPerform local reconnaissance/discoveryLocal Reconnaissance is done to understand about the system and internal network. The results help them to operate thereafter to achieve…May 3, 2020May 3, 2020
Mohan reddyinRedteam & Blueteam SeriesEscalate Local PrivilegesLocal privilege escalation happens when one user acquires the system rights of another user, means getting privileges to access something…May 3, 2020May 3, 2020