🦹
CYBERSECURITY BOOK
search
⌘Ctrlk
🦹
CYBERSECURITY BOOK
  • 👽CS && PEN-TESTING BOOK
  • 🦹REAL WORLD && CTF
  • 🦸MISCELLANEOUS
  • 🧛‍♂️ADVANCED PERSISTENT THREATS - RESEARCH
    • binocularsReconnaissance
    • pallet-boxesResource Development
    • sign-posts-wrenchInitial Compromise
    • explosionExecution
    • flask-gearEstablish persistence
    • fingerprintEscalate privileges
    • skull-crossbonesDefense Evasion
    • credit-cardCredential Access
    • periscopeDiscovery
    • transporter-1Lateral movement
    • album-collectionCollection
    • rectangle-terminalCommand and Control
    • binary-circle-checkData exfiltration
    • person-diggingImpact
  • 👾THREAT HUNTING - RESEARCH
  • 🦅CISA - INCIDENT RESPONSE PLAYBOOK
gitbookPowered by GitBook
Page cover
block-quoteOn this pagechevron-down
githubEdit

🧛‍♂️ADVANCED PERSISTENT THREATS - RESEARCH

binocularsReconnaissancechevron-rightpallet-boxesResource Developmentchevron-rightsign-posts-wrenchInitial Compromisechevron-rightexplosionExecutionchevron-rightflask-gearEstablish persistencechevron-rightfingerprintEscalate privilegeschevron-rightskull-crossbonesDefense Evasionchevron-rightcredit-cardCredential Accesschevron-rightperiscopeDiscoverychevron-righttransporter-1Lateral movementchevron-rightalbum-collectionCollectionchevron-rightrectangle-terminalCommand and Controlchevron-rightbinary-circle-checkData exfiltrationchevron-rightperson-diggingImpactchevron-right
PreviousCheatsheetchevron-leftNextReconnaissancechevron-right