Friday, December 30, 2016

[Video] Threat Actor Techniques

Threat Actor Techniques
Presented by Jeremy Junginger at FIRST security conference 2014

+++++
This demo presents a realistic attack scenario exhibiting some of the methods and techniques used by threat actors to compromise an internal network, from the Internet.
+++++
XSS - Restricted shell - Privileged shell - Hashes - Domain PWN - Network Attacks - Game Over!



+++++
Cheers!

Disclaimer

The views, information & opinions expressed in this blog are my own and do not reflect the views of my current or former employers or employees or colleagues.