Joined Adversary Simulation Manual
Ctrlk
  • Joined Adversary Simulation Manual
  • Reconnaissance
    • Active Scanning
    • Gather Victim Host Information
    • Gather Victim Identity Information
    • Gather Victim Network Information
    • Gather Victim Org Information
    • Phishing for Information
    • Search Closed Sources
    • Search Open Technical Databases
    • Search Open Websites/Domains
    • Search Victim-Owned Websites
  • Resource Development
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Command and Control
  • Exfiltration
  • Impact
  • General Pentesting
  • Tricks
  • Tools
  • Contributors
  • Kudos, References and Further Reading
Powered by GitBook
On this page

Was this helpful?

Reconnaissance

Active ScanningGather Victim Host InformationGather Victim Identity InformationGather Victim Network InformationGather Victim Org InformationPhishing for InformationSearch Closed SourcesSearch Open Technical DatabasesSearch Open Websites/DomainsSearch Victim-Owned Websites
PreviousJoined Adversary Simulation ManualNextActive Scanning

Last updated 4 years ago

Was this helpful?