Posted on
in Presentations
In the last few years, we have seen a number of classified documents leaked from Wikileaks. This includes the data dump from the CIA’s entire hacking arsenal, which has been named Vault 7. The presenter sought to implement an attack capability based on information available to the public to see whether an individual could glean enough information to build their own cyberespionage tool.
Learning Objectives:
1: Understand why you should test your security posture against real-world threats.
2: Learn how to empower your offensive security team to think like an attacker.
3: Gain undertanding through demonstration why custom tools can be so devastating to your environment.
Pre-Requisites:
Command and control (C2) infrastructure, Python, and C++.
Learning Objectives:
1: Understand why you should test your security posture against real-world threats.
2: Learn how to empower your offensive security team to think like an attacker.
3: Gain undertanding through demonstration why custom tools can be so devastating to your environment.
Pre-Requisites:
Command and control (C2) infrastructure, Python, and C++.
Share With Your Community