Rare public appearance from Tailored Access Operations leader
NSA tiger teams follow a six-stage process when attempting to crack a target, he explained. These are reconnaissance, initial exploitation, establish persistence, install tools, move laterally, and then collect, exfiltrate and exploit the data.
Source: NSA’s top hacking boss explains how to protect your network from his attack squads
Maybe not all accurate, considering where it came from, but interesting points anyway.
Robin Edgar
Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft
robin@edgarbv.com
https://www.edgarbv.com