Attack Type: Trojan Share PE
Course Overview
This scenario begins with a phishing attack where an unsuspecting employee receives an Trojan-infected email for a legitimate source. The Trojan is executed with user privileges, motivating the attacker to determine a path to privilege escalation. In this complex attack, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment. |