Power BI Fundamentals - Create visualizations and dashboards from scratch
Finance Certifications Goldman Sachs & Amazon Teams Trust
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the weaponization of esoteric internal command and control (C2) channels for lateral movement in this 38-minute Black Hat conference talk. Discover novel and reimagined techniques for breaking out of heavily segregated environments as presented by James Coote, an attack simulation consultant with F-Secure Consulting. Gain insights into innovative methods for bypassing network segregation and learn about cutting-edge approaches to internal C2 channels. Delve into the intricacies of advanced lateral movement strategies and understand their potential impact on network security.
Syllabus
Breaking Network Segregation Using Esoteric Command & Control Channels
Taught by
Black Hat