I concluded this report with a imersive and very hand-on assesement where I was able to use the tactics and tools available as a Red team player giving me a better understading of how data exploitation happens and on the Blue side once the vulnerability have been identifiedvia SIEM, I was aware of the same malicious tactics, techniques and proce…
Introduction I concluded this report with an immersive and very hands-on assessment where I was able to use the tactics and tools available as a Red team player giving me a better understanding of how data exploitation happens and on the Blue side then once the vulnerability has been identified via SIEM (Kibana), I was aware of the same malicious tactics, techniques, and best p