We perform attacks on critical services exposed in the DMZ area.
The attacker, with no additional provided information, collects publicly available data from external sources and
utilizes this information for the attack. We assess the impact on service availability within the range where service disruption does not occur.
Our goal is to proactively prevent risks posed by malicious external attackers and provide guidelines for defense.