1. Reconnaissance & OSINT
LeetProtect Team will gather and analyze information on targets using open-source intelligence (OSINT) to identify potential vulnerabilities before launching an attack.
2. Attacks on External Facing Infrastructure
LeetProtect Team will enumerate, identify and try to exploit publicly facing services such as Web Applications and Web Servers.
3. Phishing and Command & Control (C2) Infrastructure
LeetProtect Team will set up phishing campaigns and build OPSEC command and control infrastructure to facilitate secure communication with compromised systems. After gaining initial access LeetProtect Team will utilize popular C2 frameworks to launch attacks on networks, focusing on maintaining control, enumeration and data exfiltration.
4. Phishing Attacks & Email Security Evasion
LeetProtect Team will execute effective phishing attack techniques and tricks to bypass email security measures, ensuring a higher success rate for attacks.
5. MFA bypass
LeetProtect Team will attempt to attack cloud-based suite of productivity apps and gain VPN access that are protected by multi-factor authentication.
6. Antivirus and Evasion Techniques
LeetProtect Team will attempt to evade antivirus software and EDR to operate in highly secured environment.
7. Lateral Movement
LeetProtect Team will attempt to move laterally within a network after initial access, allowing for deeper infiltration and access to sensitive resources.