Cyber Capstone Part 2: The LAN Turtle
In progress...
Part 2 will explore:
Hak5's Cloud C2 usage, other C2's
.1x and NAC implementation
Larger AD environment(much like Game of Active Directory GOAD)
VPN usage
Dropbox setup automation with bash scripting
PreviousCybersecurity Capstone: Red Team Analysis of Man in the Middle Attack's Evasion Against SOC ToolsNextBreach Web: HTTP Havoc 2024
Last updated