This presentation and demonstration will outline the tools, techniques and procedures leveraged by attackers to bypass traditional security controls such as port-based Firewalls, IPS and anti-virus to deliver a successful attack. Through the use of live malware toolkits a multi-purpose attack will be designed and executed with specific goals defined.
Ещё видео!