Exfil and Reverse Shells in a Whitelisted World
Offered By: YouTube
Course Description
Overview
Explore advanced techniques for data exfiltration and reverse shell creation in environments with strict whitelisting policies in this 32-minute conference talk from Circle City Con 2016. Learn how to bypass security measures and establish covert communication channels in highly restricted networks, gaining valuable insights into offensive security strategies and defensive countermeasures.
Syllabus
Exfil and Reverse Shells in a Whitelisted World
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity