Attacking the Organization: Configure Malicious Applications

“Before we can begin deployment, we need to configure the Splunk technology add-ons. As we’ve selected one designed to snake across the network, we can simply repurpose it to collect information on our victim environment.”
-Ryan, TBG Security‘s Director of Security Engineering

[videoframes src=”” skin=”17″ controls=”1″ headline_color=”#000000″ headline_size=”22″]

Get In Touch

Have a question? We’re here to help.

Contact Us