Tactical Post Exploitation

Presented at DerbyCon 1.0 (2011), Oct. 1, 2011, 11 a.m. (50 minutes)

The presentation will cover the techniques and methods used by penetration testers and hackers, how do they enumerate and perform their tasks once on a compromised system and how to detect the tell tales signs of their presence and actions.


Presenters:

Similar Presentations: