The Cyber Attack Chain
The lifecycle of most cyber attacks can be categorized into three distinct phases.
Cyber Reboot currently focuses on the last: Post-compromise.
An attacker is tasked with a target and objective, deploys attack infrastructure, and begins to perform reconnaissance of the target.
The attack is executed, breaching the target’s defenses and establishing a foothold in the network. The attacker then sets up communication mechanisms back to the attack infrastructure.
Further exploration of the internal network occurs to identify and access specific information or target systems, collect data, and exfiltrate or otherwise accomplish the objective.
What We’re Working On
From Our Blog
Using certificates from python can be a challenging and counterintuitive process, and the default options available to developers are somewhat limited. This blog explores enhance the open source Requests Toolbelt library.
Hacktoberfest — which takes place throughout the month of October — has become an exciting time of the year for open source software. Last year we were happy to report a very successful Hacktoberfest turnout where we contributed to 85 different projects and attracted 33 new contributors to our projects. This year we hope to continue that trend.