Shmoocon 2013: Mastering Hide and Seek in Post-Exploitation Attacks πŸ”

Discover advanced techniques for hiding and maintaining access after a security breach in this insightful Shmoocon 2013 presentation on post-exploitation strategies.

Shmoocon 2013: Mastering Hide and Seek in Post-Exploitation Attacks πŸ”
theprez98
1.7K views β€’ Mar 17, 2013
Shmoocon 2013: Mastering Hide and Seek in Post-Exploitation Attacks πŸ”

Video Information

Views

1.7K

Likes

10

Duration

27:06

Published

Mar 17, 2013

User Reviews

4.0
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.