Hi,
New to DEFCON, so im not sure if im in the right place to be asking for advise so please direct me if needed.
I just wanted to get some advise regarding running any red team engagements. In general when running an engagement from say a Kali machine, do most red teamers try to hide their digital footprint etc...?
If so, what im the most common way to achieve this? Would you use proxychains to run commands?
example: -
Kali box >>> proxychains >>> nmap scan against target
Is there another way of running engagements anonymously?
Thanks for reading.
J©
New to DEFCON, so im not sure if im in the right place to be asking for advise so please direct me if needed.
I just wanted to get some advise regarding running any red team engagements. In general when running an engagement from say a Kali machine, do most red teamers try to hide their digital footprint etc...?
If so, what im the most common way to achieve this? Would you use proxychains to run commands?
example: -
Kali box >>> proxychains >>> nmap scan against target
Is there another way of running engagements anonymously?
Thanks for reading.
J©
Comment