![]() Nmap – Scanning and enumerating are key to understanding the environment.Just know: if you can see it with some of these tools and scripts, so can they. Identifying what is exposed to an attacker without privileges is key to understanding what you need to lock down and secure. Information gathering is a major part of assessing your environment. Some of the categories that Commando VM can assist with are:Īs soon as you install Commando VM, all the tools listed below become available for use. What can it be used for?Ĭommando VM is packaged with many tools for various purposes. It’s packaged with the latest and greatest tools and scripts to assist in a blue team’s education on how they work. How better to think like an attacker than to use all the tools they might leverage against you and the environment you’re attempting to secure?Ĭommando VM makes it easy to think like an attacker. This fact is somewhat concerning to me, as a central idea I learned in school is that thinking like an attacker is essential to protect yourself from attacks. Surprisingly enough, many customers are not. When working with customers, a common question I ask is if they’re familiar with tools like Mimikatz or Bloodhound. Understanding what these testing platforms are and how to use them is important for both red and blue teamers. 3 Modern Active Directory Attack Scenarios and How to Detect
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |