ATTACKIFY





Discovery techniques allow attackers to fingerprint environments & better understand the environment they are moving through. These modules emulate numerous techniques.

Discovery Modules

Discovery techniques allow attackers to fingerprint systems and networks to better understand the environment they are moving through. ATTACKIFY provides a number of modules that simulate various methods used by attackers:

  • Network share discovery
  • Enumerating Domain and LDAP servers
  • Discover Active Window Titles
  • Port scanning
  • Packet Capture
  • Domain User Enumeration
  • Virtualized Environment Detections

Related Modules

Execution

Attackers are always finding new methods to bypass execution prevention controls allowing them to execute code or commands without alerting or generating logs.

more info

APT

These modules are based off individual APT tactics, techniques and procedures to assist security teams in identifying suspicious activity usually seen in advanced persistent attackers.

more info

Phishing

Usually phishing / spearphishing is the first approach by which adversaries attempt to gain initial access to an organizations environment.

more info