Shmoocon 2013: Mastering Hide and Seek in Post-Exploitation Attacks 🔍

Discover advanced techniques for hiding and maintaining access after a security breach in this insightful Shmoocon 2013 presentation on post-exploitation strategies.

Shmoocon 2013: Mastering Hide and Seek in Post-Exploitation Attacks 🔍
theprez98
1.7K views • Mar 17, 2013
Shmoocon 2013: Mastering Hide and Seek in Post-Exploitation Attacks 🔍

Video Information

Views

1.7K

Likes

10

Duration

27:06

Published

Mar 17, 2013

User Reviews

4.0
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.