Aug. 2, 2023, 5:19 p.m. | Will Schroeder

Security Boulevard securityboulevard.com

In our previous post, we talked about the problem of structured data in the post-exploitation community. We touched on the existing relationship between our tools and data and covered some of the domain-specific challenges that come with offensive data collection. We ended with the question “If all of our offensive tools produced and worked with structured data, what would be possible?” This post shifts gears a bit and demonstrates some of our current challenges in post-exploitation workflows, some …

challenges collection community data data collection domain exploitation information security offensive post-exploitation problem question red team relationship social engineering structured data tools workflows

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

IT Consultant

@ Whitecollars | Erbil, Iraq

Sr. IAM Engineer - Okta (REMOTE)

@ GuidePoint Security LLC | Remote

DevSecOps Engineer

@ Raft | Remote, US