Blue Team Scenario Moscow
In this exercise, you will learn the power of a successful spoofing attack. Investigate the affected machines and servers and identify the sensitive data exfiltrated for the purpose of appropriate risk management and suitable mitigation.
In this exercise, you will learn the power of a successful spoofing attack. Investigate the affected machines and servers and identify the sensitive data exfiltrated for the purpose of appropriate risk management and suitable mitigation.