Dec 9, 2013
In this presentation we continue to discover how to best prepare for a penetration test. However, this time it is a bit different, as we are going to cover how to prepare for the eventual compromise. What do attackers and penetration testers do once they exploit a system? How can you best prepare and detect and stop the pivot? Because you must... Stop.. The.. Pivot. We will also share a number of tricks on how to pivot without being detected, and how best to test your web proxies and egress firewalls.