📄️ Enumeration on Port 27107
Detect the services running on port 27017:
📄️ Unauthorised-Access-Red-Team-Usecase
Unauthorised-Access Red Team Usecase
📄️ Denial of Service Red Team Usecase
Denial of Service Red Team Usecase
📄️ Elevation Of Pivilage Red Team Usecase
Elevation Of Pivilage Red Team Usecase
📄️ Gap Analysis for Redback Operations Red Team
Overview
📄️ Improper Usage Red Team Usecase
Improper Usage Red Team Usecase
📄️ Phishing Attack Red Team Usecase
Phishing Attack Red Team Usecase
📄️ Root-Access Red Team Usecase
Root Access Red Team Usecase
📄️ Virus Outbreak Red Team Usecase
Virus Outbreak Red Team Usecase
📄️ Data-Theft Red Team Usecase
Data-Theft Red Team Usecase
📄️ Penetration Test of MQTT Server
Introduction
📄️ Malware Outbreak Incident Red Team Usecase
Malware Outbreak Incident Red Team Usecase
📄️ Redback Pentest Report
1. EXECUTIVE SUMMARY
📄️ SET Email Phishing
Introduction
📄️ Phishing
Phishing is a type of cybercrime that takes advantage of human behavior to trick people into revealing confidential information or downloading harmful software. It remains one of the most common and effective methods employed by cybercriminals to illegally access personal and financial data. The term "phishing" reflects the analogy of fishing, where attackers cast broad nets to ensnare unsuspecting victims.
📄️ Evilginx2 and GoPhish Tool Usage Demonstration for Phishing
About Tool
📄️ Gap Analysis for Redback Operations Red Team
1. Lack of Practical Reconnaissance: We need more hands-on experience in gathering intelligence about the target.
📄️ Gaps in Unauthorized Login Attempts
1. Lack of Practical Reconnaissance: We need more hands-on experience in gathering intelligence about the target.
📄️ PDF Files (Downloads)
Incident Response Red Team Usecases