Threat Emulation can take many forms, and levels of sophistication ranging from targeted attacks to wide net attempts for access. Our team has first hand executed these tests against small local banks to fortune 100 organizations. Our team has broken the core concepts of Initial Access into core domains, here at Obscurity Labs we run training on what we call TCC’s (Trade-craft Core Concepts). The following TCC’s represent the core knowledge and actions that take place on a engagement.
- TCC: Threat Emulation Operation Planning
- TCC: OSINT Operations
- TCC: Secure Attack Infrastructure
- TCC: Develop & Execute a Professional Phishing Campaign
- TCC: Payload Development, Delivery, & Testing Techniques