[cs615asa] Red Team Mission Week 9
Jan Schaumann
jschauma at stevens.edu
Mon Mar 23 10:44:51 EDT 2020
Elliot Wasem <ewasem at stevens.edu> wrote:
> So, social exploits related to fraud and manipulation around computing technology?
That might work. There are already a lot of phishing
campaigns exploiting people's fear of COVID-19.
Or look at e.g. "Zoombombing" and consider what other
avenues of attack unprotected video conferences open
up.
Or perhaps how to exploit a split-VPN set up to move
laterally from a compromised personal endpoint to an
internal resource.
More information about the cs615asa
mailing list