Discovery techniques allow attackers to fingerprint systems and networks to better understand the environment they are moving through. ATTACKIFY provides a number of modules that simulate various methods used by attackers:
Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.
more infoSelect from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.
more info