Network Attack and Defense Confrontation of “Left and Right Combat Techniques”

CybersecInfo
14 min readFeb 21, 2023

This paper introduces a method to study and analyze network security countermeasure techniques from both offensive and defensive dimensions. The method is based on the analysis practice of Sysmon logs, ATT&CK tag logs, and operating system logs. Through several typical examples of offensive and defensive countermeasure techniques, the method focuses on…

--

--

CybersecInfo

CyberSecurity Beginner | Penetration Tester | Security Researcher | CISSP | "motorcyclist"