July 7, 2023, 1:10 a.m. | Ayush Kumar, David K. Yau

cs.CR updates on arXiv.org arxiv.org

In this work, we propose a testbed environment to capture the attack
strategies of an adversary carrying out a cyber-attack on an enterprise
network. The testbed contains nodes with known security vulnerabilities which
can be exploited by hackers. Participants can be invited to play the role of a
hacker (e.g., black-hat, hacktivist) and attack the testbed. The testbed is
designed such that there are multiple attack pathways available to hackers. We
describe the working of the testbed components and discuss …

adversarial adversary attack capture cyber cyber-attack enterprise enterprise networks environment exploited hackers network networks nodes play role security study vulnerabilities work

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

DevSecOps Engineer

@ LinQuest | Beavercreek, Ohio, United States

Senior Developer, Vulnerability Collections (Contractor)

@ SecurityScorecard | Remote (Turkey or Latin America)

Cyber Security Intern 03416 NWSOL

@ North Wind Group | RICHLAND, WA

Senior Cybersecurity Process Engineer

@ Peraton | Fort Meade, MD, United States

Sr. Manager, Cybersecurity and Info Security

@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US