Hunting high-value targets in corporate networks

So you got into a network, but now what? You might be swimming in a corporate environment full of thousands of systems and users. If you’re in a goal-oriented penetration testing scenario, it’s important to quickly and efficiently find the crown jewels. In this presentation we will present post-exploitation strategies and techniques for finding the interesting bits in a big network. We will be releasing several tools and describing practical data collection and analysis techniques for converting a compromise into success criteria.

Register Today!