Past Meetup

Maintaining Access to Compromised Systems Part II

This Meetup is past

26 people went

Location image of event venue


How do hackers maintain access to a system once it is compromised? What are the tools and techniques that are used to create and maintain a backdoor to a system? In this session you will learn about the methods used by hackers to continuously control and access to your systems. While the hands on labs will cover the offensive measures, it will also go over some of the defensive measures that can be used to uncover and prevent these backdoors.