Using the Registry to Discover Unix Systems and Jump Boxes

2 views
Skip to first unread message

Eyal Estrin

unread,
Mar 18, 2017, 1:20:34 PM3/18/17
to
https://www.fireeye.com/blog/threat-research/2017/03/using_the_registryt.html

Eyal Estrin
CISSP, CISM, CISA, RHCE, CCSK, Security+, MCSE:Security, MCITP:Enterprise Admin
Twitter: @eyalestrin
Reply all
Reply to author
Forward
0 new messages