Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Modern Post-Exploitation Strategies

44CON Information Security Conference via YouTube

Overview

Explore advanced post-exploitation techniques in this conference talk delivered by Rich Smith at 44CON 2012 in London. Delve into cutting-edge strategies used by security professionals after successfully breaching a system, gaining insights into maintaining access, lateral movement, and data exfiltration methods. Learn about the latest tools and tactics employed in modern post-exploitation scenarios, enhancing your understanding of both offensive and defensive security practices.

Syllabus

Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.

Taught by

44CON Information Security Conference

Reviews

Start your review of Modern Post-Exploitation Strategies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.