all InfoSec news
Challenges In Post-Exploitation Workflows
Malware Analysis, News and Indicators - Latest topics malware.news
In our previous post, we talked about the problem of structured data in the post-exploitation community. We touched on the existing relationship between our tools and data and covered some of the domain-specific challenges that come with offensive data collection. We ended with the question “If all of our offensive tools produced and worked with structured data, what would be possible?” This post shifts gears a bit and demonstrates some of our current challenges in post-exploitation workflows, some …
challenges collection community data data collection domain exploitation offensive post-exploitation problem question relationship structured data tools workflows