970d6614b8312becd69fea61133a48b4

Abstract

How to maintain stealthy access in the network by creating covert C2C.
How to use outlook as our detonator to execute our malicious payload.

Speaker

Chirag Savla

Timing

Starts at Saturday July 14 2018, 11:10 AM. The sessions runs for about 1 hour.

Resources