Mohan reddyCatastrophic Perception over internet 🌐Typically Truth is what we love to hear or see, but we tend to (or) unknowingly ignore, But that truth which you need to know, you ignores…4 min read·Oct 28, 2020----
Mohan reddyinRedteam & Blueteam SeriesFind Suspicious activityType of suspicious activities1 min read·May 4, 2020----
Mohan reddyinRedteam & Blueteam SeriesMaintain Remote access without a C2As malware writers attempt to make their malware more resilient to take-down attempts and detection, there are a number of trends that we…6 min read·May 4, 2020----
Mohan reddyinRedteam & Blueteam SeriesExfiltrate Sensitive DataData exfiltration is an unauthorized copying, transferring or retrieval of data from a source. The attacker can exfiltrate the data…4 min read·May 4, 2020----
Mohan reddyinRedteam & Blueteam SeriesFind and Access Sensitive DataRansomware, insider threat and denial of service are considered the top threats to sensitive data by recent SANS Data Protection Survey…8 min read·May 4, 2020----
Mohan reddyinRedteam & Blueteam SeriesEscalate Domain privilegesMany of the methods for gaining domain administrative privileges are the same as or similar to those used to gain local administrative…8 min read·May 4, 2020--2--2
Mohan reddyinRedteam & Blueteam SeriesLateral MovementThe number and complexity of cyber-attacks are ceaselessly increasing while the existing security measures is far lagging in detecting…9 min read·May 3, 2020----
Mohan reddyinRedteam & Blueteam SeriesPerform Network Reconnaissance/DiscoveryThe process for internal reconnaissance is the same as the initial reconnaissance step in the cyber kill chain. However, more detailed…7 min read·May 3, 2020----
Mohan reddyinRedteam & Blueteam SeriesPerform local reconnaissance/discoveryLocal Reconnaissance is done to understand about the system and internal network. The results help them to operate thereafter to achieve…6 min read·May 3, 2020----
Mohan reddyinRedteam & Blueteam SeriesEscalate Local PrivilegesLocal privilege escalation happens when one user acquires the system rights of another user, means getting privileges to access something…6 min read·May 3, 2020----