Description: Applications continue to be a valuable door for attackers to use for remote access to a network. If an application is compromised, the webserver itself can be used to enable a C2 channel and provide a platform for post exploitation.
For More Information Please Visit:- https://www.bsideshuntsville.org/
http://www.irongeek.com/i.php?page=videos/bsideshuntsville2016/mainlist
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.