Skip to content

Details

SUMMARY: This will be a continuation of previous Red Team talks. We will be covering active enumeration, basic exploitation, network pivoting, and active directory enumeration/exploitation.

GOAL: Provide attendees with intermediate understanding of exploitation techniques.

THINGS TO BRING: Computer with Kali Linux natively installed or running as a VM. Be able to connect wirelessly to a closed network. Note taking materials.

LEVEL: Individuals with basic understanding of networking concepts. Topics will be explained as they are covered.

PRESENTER: nyte

Related topics

You may also like