Techniques used to identify and gather data from a target network prior to exfiltration
Last updated 4 months ago