Joined Adversary Simulation Manual
Ctrl
k
Copy
Reconnaissance
Gather Victim Org Information
Business Relationships
Determine Physical Locations
Identify Business Tempo
Identify Roles
Previous
Gather Victim Network Information
Next
Phishing for Information
Last updated
5 years ago
Was this helpful?