In-depth security research, exploit development, and technical write-ups covering real-world penetration testing, red teaming operations, and phishing campaigns
Showing 1 of 1 posts in "Recon"
Recon from unauthenticated and authenticated angles using techniques and tools such as Nmap, RPC/IIS fingerprinting, LDAP/WMI to locate MPs/DPs and exposed package artifacts.