Implants and other offensive security hardware placed within the target environment and used to ex-filtrate data from the target network to a remote asset.

Implant

Setting up the ‘PhanTap’

The ‘PhanTap’ is an ‘invisible’ network tap written by the guys at NCC Group and aimed at red teams. With limited physical access to...
d3d
2 min read
×

*NOTE*

I am currently updating the site, so posts will starting showing up from my previous blog very soon.