Description: The presentation will cover the techniques and methods used by penetration testers and hackers, how do they enumerate and perform their tasks once on a compromised system and how to detect the tell tales signs of their presence and actions.
Tags: securitytube , DerbyCon , Derby Con , hacking , hackers , information security , convention , computer security , Derby 11 , DerbyCon 11 , DerbyCon-2011 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.