In: Where the falcons and foxes roam¶
Welcome to the In phase, where attackers don’t knock, they pick the lock, clone the key, or just walk in behind someone carrying coffee. This is the falcon’s dive and the fox’s sneak, where initial access isn’t about brute force, but finesse. Phishing emails? Bait on a hook. Tailgating? A predator blending with the herd. And that unpatched server? An open burrow just begging to be claimed. The hunt begins here, where the only rule is: Don’t get caught before the feast.
Turn ‘impossible’ into ‘I’m in’:
- A canopy of apple-blossom
- Social engineering
- Where wild boars plough through endpoints
- Wolverines do not ask for permissions
- Riches in the ground
- The Primordial Grimoire
- Rootways of the World Tree (@Internet)
- Patches of mycelium (@Home and @Org)
- Operational procedures for network attacks
- Attack chain playbooks for network operations
- Fungal forays: THM’s mycelial maze
- Rhizomatic ranges: Root-me’s network underworld
- Roots of the world tree: RIPE NCC security labs
- Earthworks
- Blight-Weaver's Spore-Songs @GitHub
- The device is just the keyring
- Poking physics with network packets