all InfoSec news
Challenges In Post-Exploitation Workflows
Security Boulevard securityboulevard.com
In our previous post, we talked about the problem of structured data in the post-exploitation community. We touched on the existing relationship between our tools and data and covered some of the domain-specific challenges that come with offensive data collection. We ended with the question “If all of our offensive tools produced and worked with structured data, what would be possible?” This post shifts gears a bit and demonstrates some of our current challenges in post-exploitation workflows, some …
challenges collection community data data collection domain exploitation information security offensive post-exploitation problem question red team relationship social engineering structured data tools workflows