Overview
Explore advanced post-exploitation techniques in this conference talk delivered by Rich Smith at 44CON 2012 in London. Delve into cutting-edge strategies used by security professionals after successfully breaching a system, gaining insights into maintaining access, lateral movement, and data exfiltration methods. Learn about the latest tools and tactics employed in modern post-exploitation scenarios, enhancing your understanding of both offensive and defensive security practices.
Syllabus
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.
Taught by
44CON Information Security Conference