Skip to content

After the Breach: Deploying Post Exploitation Infrastructure with Covenant

Photo of Amanda Wales
Hosted By
Amanda W. and 2 others
After the Breach: Deploying Post Exploitation Infrastructure with Covenant

Details

Please RSVP for this event using our EventBrite link
https://www.eventbrite.com/e/after-the-breach-deploying-post-exploitation-infrastructure-with-covenant-tickets-81407003539

Obtaining a foothold in a target network is just the first step in any penetration test. Attackers must be able to enumerate system and account details in order to fully compromise the target network or achieve objectives.

Every attacker has a different toolbox and methodology, but a solid approach has always been to drop an agent on the compromised host and direct the agent via a Command and Control (C2) server. In this talk, we will evaluate strategies for deploying C2 infrastructure as well as demonstrate how to effectively leverage Covenant, a .NET command and control framework, in a lab environment to manage your post exploitation operations.

Pizza and drinks will be provided!

About the speaker:
Jim Holcomb performs penetration tests against a variety of different targets and environments in his daily work as a Security Consultant for Evolve Security. When he isn't colluding with our reptilian overlords, Jim enjoys developing applications and pentesting tools with Python and automating operations via Docker, Terraform and Packer.

Sponsored by TEKSystems Chicago!

Photo of EvolveSec - Chicago Cybersecurity group
EvolveSec - Chicago Cybersecurity
See more events
1871
222 W Merchandise Mart Plaza #1212 · Chicago, IL