all InfoSec news
How do threat actors run their tools?
May 1, 2023, 11:28 p.m. | /u/Original-Prompt4285
cybersecurity www.reddit.com
The assumption is that an adversary shouldn't be able to execute malicious code on a user workstation or server. Assume this is all Windows.
We (small team, medium company) were going through an external report as a simulation exercise where the adversary ran tools like rubeus, mimikatz and python scripts.
What …
adversary application certificates code context control control system cybersecurity malicious question run server signature system things threat threat actors tools windows workstation
More from www.reddit.com / cybersecurity
Jobs in InfoSec / Cybersecurity
Information System Security Officer / Auditor
@ Peraton | Washington, DC, United States
Senior Cloud Security Engineer
@ Alludo | US | Boston, MA, US | San Francisco, CA, US | Austin, TX, US
Tier 3 - Malware Analyst, SME
@ Resource Management Concepts, Inc. | Quantico, Virginia, United States
Temp to Hire Senior DevSecOps Engineer
@ Scientific Systems Company, Inc. | Burlington, Massachusetts, United States
Security Engineer III - Splunk | SIEM
@ JPMorgan Chase & Co. | Plano, TX, United States
Information Systems Security Officer / Auditor
@ Peraton | Washington, DC, United States