Skip to content

Details

  • Understanding and performing recon on the target network using port scanning tools.
  • Identifying potential and critical targets to exploit.
  • Connecting the dots to complete the attack chain: Exploiting DNS.
  • Detecting such attacks using a holistic SIEM solution.

Members are also interested in