Analysis, Video Demo

[Video] Threat Actor Techniques

Threat Actor Techniques
Presented by Jeremy Junginger at FIRST security conference 2014

+++++

This demo presents a realistic attack scenario exhibiting some of the methods and techniques used by threat actors to compromise an internal network, from the Internet.

+++++
XSS – Restricted shell – Privileged shell – Hashes – Domain PWN – Network Attacks – Game Over!

+++++
Cheers!

Leave a Reply

Your email address will not be published. Required fields are marked *