Post-Exploitation Techniques

D0413f951b7630625bc8e1ef23c693e9?s=47 ams
April 21, 2012

Post-Exploitation Techniques

Post-Exploitation & Data Exfiltration techniques for penetration testers. Originally presented at BeaCon 2012 in Boston, MA. Also, my first public infosec talk so don't hate too much.

D0413f951b7630625bc8e1ef23c693e9?s=128

ams

April 21, 2012
Tweet