(Created blank page) |
No edit summary |
||
Line 1: | Line 1: | ||
=Description= | |||
Collection in a cyber security red team context refers to the methods and techniques used by adversaries to gather relevant information for achieving their objectives. This information can come from various sources such as drives, browsers, audio, video, and email. The goal of collection is often to exfiltrate the data, and common techniques include capturing screenshots and recording keyboard input. It is an important step in the adversary's plan, allowing them to gather information needed to support their operations. |
Revision as of 14:54, 29 January 2023
Description
Collection in a cyber security red team context refers to the methods and techniques used by adversaries to gather relevant information for achieving their objectives. This information can come from various sources such as drives, browsers, audio, video, and email. The goal of collection is often to exfiltrate the data, and common techniques include capturing screenshots and recording keyboard input. It is an important step in the adversary's plan, allowing them to gather information needed to support their operations.
This category currently contains no pages or media.