<div>Hey all,</div><br><div>For this week's article for the red team, I'd like to present an article which highlights some basic principles and tactics used by attackers within a corporate network, with the prerequisite of having gained access to one computer in the network. Its approach is rather high level but begins to draw the picture of how an attack might be carried out by some adversary to the corporate network.</div><br><div><span style="color:rgb(16, 129, 247)"><font style="font-size:14.5px"><font style="font-family:Nylas-Pro, Helvetica, &quot;Lucidia Grande&quot;, sans-serif"><a href="https://securelist.com/security-holes-in-corporate-networks-network-vulnerabilities/67452/" title="https://securelist.com/security-holes-in-corporate-networks-network-vulnerabilities/67452/">https://securelist.com/security-holes-in-corporate-networks-network-vulnerabilities/67452/</a></font></font></span></div><br><div><signature id="local-5443727c-3081"><table cellpadding="0" cellspacing="0"><tbody><tr><td style="vertical-align:top"><img alt="" src="https://user-generated.getmailspring.com/asset/NmY5Mjg2ODgtZWMyNy00YjMzLWFmNGItYTlmMDQ1OTAxNzZlL3NpZy1sb2NhbC01NDQzNzI3Yy0zMDgxLnBuZw.png?t=1571062885269&amp;msw=246&amp;msh=249" width="59" height="60" style="max-width:60px;max-height:60px;margin-right:10px"></td><td><div>Elliot Wasem</div><div style="font-size:0.9em;border-top:1px solid gray;min-width:250px;max-width:300px;margin-top:4px;padding-top:4px"><div><div></div><div><a href="https://elliotwasem.xyz">https://elliotwasem.xyz</a></div><div><a href="http://linkedin.com/in/elliot-wasem" title="LinkedIn" style="margin-right:8px"><img src="https://www.getmailspring.com/signature-assets/linkedin.gif" width="13" height="13" alt="LinkedIn"></a></div></div></div></td></tr></tbody></table></signature></div>