Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced post-exploitation techniques in this conference talk delivered by Rich Smith at 44CON 2012 in London. Delve into cutting-edge strategies used by security professionals after successfully breaching a system, gaining insights into maintaining access, lateral movement, and data exfiltration methods. Learn about the latest tools and tactics employed in modern post-exploitation scenarios, enhancing your understanding of both offensive and defensive security practices.
Syllabus
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.
Taught by
44CON Information Security Conference