Discovery techniques allow attackers to fingerprint systems and networks to better understand the environment they are moving through. ATTACKIFY provides a number of modules that simulate various methods used by attackers:
Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.
more infoExfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2's. Discover which services, ports and protcols can bypass your DLP solutions.
more info