Hack In The Box Security Conference
Exploitation Techniques and Attacks on Hosting Assets and Access for Resale
Exploration of underground markets for compromised network assets, covering exploitation techniques, lateral movement, monetization, and defender strategies for incident response and security monitoring.