Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the development of a Python-based post-exploitation framework in this 50-minute conference talk from BSidesLV 2016. Delve into the motivations behind creating such a tool and discover its practical applications. Learn about initial phishing access techniques, including the use of Office macros, and understand the process of host triage. Witness a live demonstration showcasing domain enumeration and persistence methods for both Windows and Mac systems. Gain insights into hijacking techniques and get a glimpse of future plans for the framework. Equip yourself with knowledge about advanced post-exploitation strategies and their implementation using Python.