đŠč
CYBERSECURITY BOOK
Ctrl
K
Copy
đ§ââïž
ADVANCED PERSISTENT THREATS - RESEARCH
Discovery
The adversary is trying to figure out your environment.
Previous
Credential Access
Next
Lateral movement
Was this helpful?