Esec forte technologies - red team specialist - cloud platform
MumbaieSec Forte Technologies
...VPN/VDI exploitation, credential harvesting.- Active Directory Attack Techniques : Privilege escalation, lateral movement, ADCS abuse, ACL abuse, Kerberoasting, constrained delegation attacks.- EDR Evasion & Detection Bypass : Memory injection, indirect syscalls, callback-based execution, sandbox/EDR bypass.- CI/CD & DevOps [...]