[cs615asa] Red Team Week 9

Aleeza Shaikh ashaikh1 at stevens.edu
Mon Apr 1 18:15:45 EDT 2019

On behalf of the red team,

We would like to revise the week 9 link to:

<https://www.informationsecuritybuzz.com/expert-comments/lazy-hackers-turn-to-automated-attack-tools/>https://www.informationsecuritybuzz.com/expert-comments/lazy-hackers- turn-to-automated-attack-tools<https://www.informationsecuritybuzz.com/expert-comments/lazy-hackers-turn-to-automated-attack-tools>

This link tells us how hackers have been automating attacks so that they don't have to spend much time writing code

Thank you,

Get Outlook for Android<https://aka.ms/ghei36>

From: cs615asa-bounces at lists.stevens.edu <cs615asa-bounces at lists.stevens.edu> on behalf of Jan Schaumann <jschauma at stevens.edu>
Sent: Monday, April 1, 2019 2:14:19 PM
To: cs615asa at lists.stevens.edu
Subject: Re: [cs615asa] Red Team Week 9

Aleeza Shaikh <ashaikh1 at stevens.edu> wrote:

> On behalf of the red team, the link for week 9;

Can you elaborate on how this relates to this week's topic?  It using
powershell as vector to deliver the payload is a bit weak of a
connection to our discussion on automation and writing system tools, I'm

cs615asa mailing list
cs615asa at lists.stevens.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20190401/a28a605c/attachment-0001.html>

More information about the cs615asa mailing list