Blue Team Scenario Mumbai
In this exercise, you will learn how a seemingly innocent activity can be the source of a sophisticated cyber-attack. While closely monitoring the attacker's steps, you will get a close look at different attack techniques for lateral movement, privilege escalation and data exfiltration.
In this exercise, you will learn how a seemingly innocent activity can be the source of a sophisticated cyber-attack. While closely monitoring the attacker's steps, you will get a close look at different attack techniques for lateral movement, privilege escalation and data exfiltration.