This new entry has the objective of showcasing how mitre Caldera™ works, and how it can be useful for adversarial simulation and simulated red team operations. This platform was designed to easily run autonomous breach-and-attack simulation exercises, it also allows…
The content of this article is intended for educational and awareness purposes. Everyone in InfoSec knows Metasploit and the importance this tool has had on many professionals and in the field itself, either be it for awareness purposes, education, CTFs…
Modern cyber-criminal gangs, deploy multiple state-of-the-art techniques to retrieve information from a compromised or breached company. This is because most companies isolate, in varying degrees, their internal network from the public internet, blocking certain file transfer protocols, or prevent access…
Author Info
- Name:Bruno Pincho
- Email:[email protected]
- Total Post: 3
Penetration Tester
Msc in Electrical and computer engineering, worked initially in internet and web programming, until I specialised in penetration testing.
CEH and PNPT certificated.
Msc in Electrical and computer engineering, worked initially in internet and web programming, until I specialised in penetration testing.
CEH and PNPT certificated.