ATT&CK #9 - System Information Discovery
Following initial access to a system, adversaries gather information about the system to decide how to continue the attack. The course will investigate how the attackers discover what system information with real world use cases.
Red Report 2023
Improve your understanding of trending adversary TTPs
Get practical recommendations for enhancing your security posture
Obtain real-world examples for red teams