technique
https://cloud.google.com/compute/docs/disks/restore-and-delete-snapshots
Google. (2019, October 7). Restoring and deleting persistent disk snapshots. Retrieved October 8, 2019.
technique
https://www.techrepublic.com/blog/the-enterprise-cloud/backing-up-and-restoring-snapshots-on-amazon-
Hardiman, N.. (2012, March 20). Backing up and restoring snapshots on Amazon EC2 machines. Retrieved October 8, 2019.
technique
https://attack.mitre.org/techniques/T1578/004
technique
https://capec.mitre.org/data/definitions/13.html
technique
https://attack.mitre.org/techniques/T1148
technique
https://cybersecurity.att.com/blogs/labs-research/scanbox-a-reconnaissance-framework-used-on-waterin
Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020.
technique
https://attack.mitre.org/techniques/T1592
technique
https://medium.com/@menakajain/export-download-ssl-certificate-from-server-site-url-bcfc41ea46a2
Jain, M. (2019, September 16). Export & Download — SSL Certificate from Server (Site URL). Retrieved October 20, 2020.
technique
https://www.sslshopper.com/ssl-checker.html
SSL Shopper. (n.d.). SSL Checker. Retrieved October 20, 2020.
technique
https://attack.mitre.org/techniques/T1596/003