As attackers on a red-team engagement, we have a multitude of tools at our disposal. Whether scanning a system or extracting passwords from memory, there’s almost always a perfect script or program for the job. The defensive potential of these resources, however, is often overlooked. Many offensive tools can be used to provide valuable data for the Blue Team in addition to compromising systems.
Jump to: Navigation