[cs615asa] Red Team Mission Week 9

Jan Schaumann jschauma at stevens.edu
Mon Mar 23 10:44:51 EDT 2020


Elliot Wasem <ewasem at stevens.edu> wrote:
> So, social exploits related to fraud and manipulation around computing technology?

That might work.  There are already a lot of phishing
campaigns exploiting people's fear of COVID-19.

Or look at e.g. "Zoombombing" and consider what other
avenues of attack unprotected video conferences open
up.

Or perhaps how to exploit a split-VPN set up to move
laterally from a compromised personal endpoint to an
internal resource.



More information about the cs615asa mailing list