Download pdf
Attackers head straight for your marketable data and crown jewel services, but how do they go about finding, exploiting and acting on objectives for those critical assets? Based on thousands of observed real-world attacks, this session will reveal the most popular methods that attackers use when reconnoitering, exploiting and taking action on databases, file servers and Active Directory services.

Learning Objectives:
1: Learn how attackers exfiltrate data.
2: Understand how attackers move laterally within an environment.
3: Gain understanding of methods attackers use to perform reconnaissance.

Pre-Requisites:
Fundamental understanding of the network.
Presenters