SANS Penetration Testing

Post Exploitation Redux Webcast Slides

Last Thursday, John Strand and I delivered a new webcast on post exploitation, covering all kinds of tips and tricks. I focussed on some of the cool stuff you can do with the Windows netsh command, including setting up port pivots, sniffing, and gaining remote access to a target's network configuration. John Strand discussed a new tool his team released that provides a command and control channel via gmail. We covered a lot of fun and useful material.

Pillage

The slides are available here.

And, if you'd like to hear the webcast itself, you can do so here.

If you really like this kind of thing, I hope you'll consider taking the SANS Security 560 course from me soon, where we delve deep into the art of high-value penetration testing. I'll be teaching it at SANS Orlando in April. Hope you can join us there!

Thanks!

-Ed Skoudis & John Strand

1 Comments

Posted March 11, 2015 at 1:03 PM | Permalink | Reply

Ben

testing post move ''" live

Post a Comment






Captcha


* Indicates a required field.