📓
📓
📓
📓
Red Team Notes
Search
⌃
K
📓
📓
📓
📓
Red Team Notes
Search
⌃
K
Introduction
Red Team Notes 2.0
Red Team
Initial Access
Execution
Persistence
Privesc
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Active Directory
Introduction
Enumeration
Attacks
Detection
Detection
Initial Access
Execution
Resources & References
References & Resources
Powered By
GitBook
Comment on page
Discovery
The adversary is trying to figure out your environment.
Previous
LLMNR/NBT-NS Poisoning and Relay
Next
Lateral Movement
Last modified
3yr ago