Are you curious about how an advanced persistence threat (APT) operates during an ongoing attack? We found more about it with a Red Team member of InfoGuard AG!
The talk took us through the typical stages of an attack, its intermediate goals, and the possible procedures on how to achieve those. It gave not only a high-level overview of the attack, but also some detailed technical insights into certain techniques and vulnerabilities used throughout the attack. One presented example was the weaponization of a Word Document and how to analyze it in depth.