Ruler Pivoting Through Exchange
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the intricacies of ruler pivoting through Exchange in this conference talk from TROOPERS17. Delve into advanced IT security concepts as Etienne Stalmans presents innovative techniques for penetration testing and vulnerability assessment. Gain insights into exploiting Exchange servers, understanding potential attack vectors, and implementing effective defense strategies. Learn how to identify and mitigate risks associated with Exchange environments, enhancing your organization's overall security posture. Discover practical applications of ruler pivoting and its implications for both offensive and defensive security professionals.
Syllabus
TR17 - Ruler Pivoting Through Exchange - Etienne Stalmans
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube