Exfil and Reverse Shells in a Whitelisted World
Offered By: YouTube
Course Description
Overview
Explore advanced techniques for data exfiltration and reverse shell creation in environments with strict whitelisting policies in this 32-minute conference talk from Circle City Con 2016. Learn how to bypass security measures and establish covert communication channels in highly restricted networks, gaining valuable insights into offensive security strategies and defensive countermeasures.
Syllabus
Exfil and Reverse Shells in a Whitelisted World
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX