48a3a20783e96aeed6a6ff280e5e8ada

Abstract

This is the continuation of my last session about infiltrating corporate network.
In this session, I will cover the approach of passive enumeration and look at some common web application-based attacks which can be used for gaining initial access into the enterprise network.

Speaker

Sanket Solanki

Timing

Starts at Saturday December 14 2019, 10:45 AM. The sessions runs for about 1 hour.

Resources