YoVDO

Ruler Pivoting Through Exchange

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses

Course Description

Overview

Explore the intricacies of ruler pivoting through Exchange in this conference talk from TROOPERS17. Delve into advanced IT security concepts as Etienne Stalmans presents innovative techniques for penetration testing and vulnerability assessment. Gain insights into exploiting Exchange servers, understanding potential attack vectors, and implementing effective defense strategies. Learn how to identify and mitigate risks associated with Exchange environments, enhancing your organization's overall security posture. Discover practical applications of ruler pivoting and its implications for both offensive and defensive security professionals.

Syllabus

TR17 - Ruler Pivoting Through Exchange - Etienne Stalmans


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube