Yeah I think we can definitely get that to 100%https://twitter.com/x0rz/status/1209583796863016960 …
-
-
Really the only thing real adversaries need these days are the final deployed capabilities. Some do use initial access services. However, exploits are covered, post-exploitation is covered, just need final deployed capabilities (spyware, ransomware, point of sale, destructive).
-
And even some of those have been published by the offsec community, tbh. I'm pretty sure there's "educational ransomware" on github. "Destructive" can be covered with a couple one liners for single-system destruction (advanced targets need not apply).
- Još 4 druga odgovora
Novi razgovor -
-
-
I dunno, for final exploitation you pretty much need calc.exe
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.