Skip to content

Details

  • Identify user account permissions and modify them with no privileges.
  • Discover critical resources such as domain controllers and servers.
  • Identify avenues to exfiltrate date seamlessly by enabling USB ports or tweaking firewall policies.

Members are also interested in