The Team specializes in performing “Wizardry” of sorts – Once called the “Ghosts” of infosec, Our art of stealthy, covert, exploitation, performing CNO/CNE Global Computer Network Exploitation and leaving no trace. A project, a group of professionals.
Cybersecurity Professionals that Utilize Critical thinking in acquiring and tracking targets. Creating exploits, code that allows us to secretly access a system. Long been held to be that of evildoers, or nefarious characters. Our goal is to pass on knowledge and bridge the divide, so that future Cyber Operators are better able to perform these techniques, tactics and procedures.
Know that Red & Blue teaming alone wont save your organization from the stealthy adversaries that are hell-bent on getting into your enterprise. Offensive operations against critical infrastructure and organizations trade secrets are on the rise. Our mission is to teach attendees to understand not only the TTP’s of an adversary how to position defensive measures. The Tailored Access Cyber Operator is the ultimate adversary their “SecretCrum”.
Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary information systems or networks.
The objective of CNA is to deny the adversary the ability to use their computer systems, stored information and networks as intended.