Defense Perimeter Bypass

  • Several attacks will be carried out in order to get access to the corporate network, using data obtained in the initial phase of the attack vector. The goal is to reach a position within the organization that allows us active connection via our command and control server. All of the scenarios gathered in the first stage are valid to attack and will be tested.
  • A privilege escalation process will be conducted in order to gain access to sensitive information and to create a reusable access point.