Hey everyone
.
At my workplace we’re running some tests on an anti-virus/behaviour monitoring/firewall/and more software from a potential new vendor.
My assignment is to compromise a test-pc (on an isolated network, don’t worry) as much as possible in order to see how the software reacts. Essentially I need to pen-test the machine.
.
I’m kind of new to this area, so can you guys recommend some good ways to compromise the PC with an array of different approaches?
.
Thanks in advance.
Source: Read More