Handle Exploitation of Remote Systems Without Being Online!

Presented at ToorCon San Diego 13 (2011), Unknown date/time (Unknown duration)

This talk will quickly cover how to control systems that you've exploited that may not always be online through various 3rd party services such as Gmail/Hotmail/etc.


Presenters:

Similar Presentations: