Threat Actor Techniques
Presented by Jeremy Junginger at FIRST security conference 2014
This demo presents a realistic attack scenario exhibiting some of the methods and techniques used by threat actors to compromise an internal network, from the Internet.
Using Metasploit Meterpreter to modify target's registry and configure a persistent netcat listener.
Comments & feedback are Welcome.