Shmoocon 2013: Mastering Hide and Seek in Post-Exploitation Attacks π
Discover advanced techniques for hiding and maintaining access after a security breach in this insightful Shmoocon 2013 presentation on post-exploitation strategies.

theprez98
1.7K views β’ Mar 17, 2013

Video Information
Views
1.7K
Likes
10
Duration
27:06
Published
Mar 17, 2013
User Reviews
4.0
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.