AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Common Ivasion Technice Things to Look Out for in Trap Hunting
There are two things that are almost completely under your control as an attacker. The source ip address, and the usur agent. You can create a simple alarm by using v peering to log into subnets. And there's a sorcpwhic you wouldn't expect an attacker would be able to control. But that was one of the fine hings i had. I haven't seen many attackers really making use of it but why not? It is what is supplied by the user, by the club. So other common ivasion technice people should look out for in tread hunting.