Cyber Capstone Part 2: The LAN Turtle
In progress...
Part 2 will explore:
Hak5's Cloud C2 usage, other C2's
.1x and NAC implementation and bypass attempts
Larger AD environment(much like Game of Active Directory GOAD)
VPN setup and usage
Dropbox setup automation using bash
PreviousCybersecurity Capstone: Red Team Analysis of Man in the Middle Attack's Evasion Against SOC ToolsNextUSB Rubber Ducky
Last updated