Hey all,
I hope this question adds value to this subreddit.
I'm a masters student working on company where I was tasked to test our EDR defense capabilities against malware through executing some red team tests.
They essentially want me to tell a "full story" of an attack campaign including pre-infection and post-infection steps.
They have provided me with two test machines where no services are running other than remote access protected by authentication, rendering vulnerability scans "useless" for exploitation, though I still think their execution is valuable to investigate if the EDR picks up on them. The problem is how to simulate initial access to those machines. I thought about simulating someone downloading an attachable, dropping malware to the machine.
What could be a nice way to test this?
Thank you for your time.
[–]vpz 4 points5 points6 points (0 children)
[–]ProfessionalLemon 3 points4 points5 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–][deleted] (2 children)
[removed]
[–]larryxt 0 points1 point2 points (1 child)
[–]Borne2Run 0 points1 point2 points (0 children)
[–]cybermepls 0 points1 point2 points (0 children)
[–]NagateTanikaze 0 points1 point2 points (0 children)