ATTACKIFY





Discovery techniques allow attackers to fingerprint environments & better understand the environment they are moving through. These modules emulate numerous techniques.

Discovery Modules

Discovery techniques allow attackers to fingerprint systems and networks to better understand the environment they are moving through. ATTACKIFY provides a number of modules that simulate various methods used by attackers:

  • Network share discovery
  • Enumerating Domain and LDAP servers
  • Discover Active Window Titles
  • Port scanning
  • Packet Capture
  • Domain User Enumeration
  • Virtualized Environment Detections

Related Modules

Exploits

Simulate numerous exploit techniques as used by attackers & malware to inject into processes, elevate privileges or impersonate users. Modules are designed to emulate core functionality without potwntially damaging systems.

more info

Phishing

Usually phishing / spearphishing is the first approach by which adversaries attempt to gain initial access to an organizations environment.

more info

APT

These modules are based off individual APT tactics, techniques and procedures to assist security teams in identifying suspicious activity usually seen in advanced persistent attackers.

more info