* Cantinho Satkeys

Refresh History
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    Hoje às 11:14
  • JP: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0  classic
    22 de Maio de 2026, 05:50
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    21 de Maio de 2026, 11:42
  • JP: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0 yu7gh8
    21 de Maio de 2026, 05:12
  • cereal killa: try65hytr malta  4tj97u<z 2dgh8i
    20 de Maio de 2026, 23:14
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana   4tj97u<z
    16 de Maio de 2026, 11:36
  • j.s.: tenham um excelente fim de semana  4tj97u<z
    15 de Maio de 2026, 20:53
  • j.s.: try65hytr a todos  49E09B4F
    15 de Maio de 2026, 20:52
  • JP: try65hytr Pessoal 4tj97u<z 2dgh8i k7y8j0 yu7gh8
    15 de Maio de 2026, 05:52
  • FELISCUNHA: ghyt74 pessoal   4tj97u<z
    14 de Maio de 2026, 11:31
  • cereal killa: try65hytr pessoal  49E09B4F 2dgh8i
    13 de Maio de 2026, 21:15
  • nsama71: uhf
    11 de Maio de 2026, 05:57
  • FELISCUNHA: ghyt74  votos de um santo domingo para todo o auditório  4tj97u<z
    10 de Maio de 2026, 11:02
  • j.s.: bom fim de semana   4tj97u<z
    09 de Maio de 2026, 20:41
  • j.s.: try65hytr a todos  49E09B4F 49E09B4F
    09 de Maio de 2026, 20:41
  • FELISCUNHA: ghyt74  Pessoal  49E09B4F
    08 de Maio de 2026, 11:39
  • JP: try65hytr A Todos  4tj97u<z 2dgh8i k7y8j0 yu7gh8
    08 de Maio de 2026, 05:50
  • JP: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0
    07 de Maio de 2026, 05:23
  • j.s.: dgtgtr a todos  49E09B4F 49E09B4F
    05 de Maio de 2026, 16:34
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    04 de Maio de 2026, 11:28

Autor Tópico: Post Exploitation Pillaging and Data Exfiltration  (Lida 508 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 132466
  • Karma: +0/-0
Post Exploitation Pillaging and Data Exfiltration
« em: 30 de Junho de 2019, 11:25 »

Post Exploitation: Pillaging and Data Exfiltration
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 17m | 134 MB
Instructor: Rithwik Jayasimha

The simplest stage in a penetration test is data exfiltration, or is it? With the advent of new types of attackers, testing this is more critical than ever before. In this course, you'll explore some of the processes involved in this stage.

Safeguarding a network today requires a multiple stage approach, not only is it important to keep attackers out, but it is also important to keep data from leaving the network. This means that we need to begin looking at data exfiltration not just as a stage in the penetration test, but as a more comprehensive solution that requires more robust checks from the client to lock down. In this course, Post Exploitation: Pillaging and Data Exfiltration, you'll gain the ability to evaluate the systems not just for the data that they may possess through pillaging, but also begin to look at each system as another step in a long chain that can be leveraged to exfiltration. First, you'll explore pillaging, critically evaluating the value of the system with pre-determined parameters. Next, you'll discover how to chain multiple attacks together to create the final path for data exfiltration, touching upon bypassing some modern protection mechanisms. Finally, you'll learn how to ask yourself the questions that will enable you to create your own processes. When you're finished with this course, you'll have the skills and knowledge of pillaging and data exfiltration needed to create, build, and execute attacks upon networks in a manner that will enable you to create a report that has value to your clients.
             

               

Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction