🦹
CYBERSECURITY BOOK
Ask or search...
Ctrl + K
🧛♂️
ADVANCED PERSISTENT THREATS - RESEARCH
Discovery
The adversary is trying to figure out your environment.
Previous
Credential Access
Next
Lateral movement
Was this helpful?