Mapping a network from the perspective of an external attacker or an internal attacker. The lab has expertise in many areas of networking, and this expertise can be turned into a stealthy, sensitive information gathering tool that's useful for both offense and defense.
Idea from Thomas Reddington.
Mapping a network from the perspective of an external attacker or an internal attacker. The lab has expertise in many areas of networking, and this expertise can be turned into a stealthy, sensitive information gathering tool that's useful for both offense and defense.