An excerpt from our recent No Suit No Ties session from Incident Response called Vulnerabilities and Workarounds, where we explore a compelling case study in which attackers exploited vulnerabilities in an internet-facing device to gain initial access, escalate privileges, conduct reconnaissance, and infiltrate the internal network.
An excerpt from our recent No Suit No Ties session from Incident Response called Vulnerabilities and Workarounds, where we explore a compelling case study in which attackers exploited vulnerabilities in an internet-facing device to gain initial access, escalate privileges, conduct reconnaissance, and infiltrate the internal network.