A look at modern adversary behavior and the usage of open source tools in the enterprise - Help Net Security

A look at modern adversary behavior and the usage of open source tools in the enterprise - Help Net Security

Leszek Miś is the founder of Defensive Security, a principal trainer and security researcher with over 15 years of experience. Next week, he’s running an amazing online training course – In & Out – Network Exfiltration and Post-Exploitation Techniques [RED Edition] at HITBSecConf 2020 Singapore, so it was the perfect time for an interview.



What are the main characteristics of modern adversary behavior? What should enterprise security teams be on the lookout for?

This is a very open question as it depends on the attacker’s skillset and offensive experience. Modern adversaries like to behave in various ways. Don’t forget it’s also closely related to what the target is, and the attacker’s budget.


From what we are seeing in the wild, in most cases an adversary uses ..

Support the originator by clicking the read the rest link below.