Главная
Study mode:
on
1
Intro
2
Agenda
3
Why build this
4
The solution
5
Initial phishing access
6
Fishing with the Office macro
7
Host triage
8
Demo
9
Domain Enumeration
10
Persistence
11
Windows
12
Mac
13
Hijacking
14
Future Plans
Description:
Explore the development of a Python-based post-exploitation framework in this 50-minute conference talk from BSidesLV 2016. Delve into the motivations behind creating such a tool and discover its practical applications. Learn about initial phishing access techniques, including the use of Office macros, and understand the process of host triage. Witness a live demonstration showcasing domain enumeration and persistence methods for both Windows and Mac systems. Gain insights into hijacking techniques and get a glimpse of future plans for the framework. Equip yourself with knowledge about advanced post-exploitation strategies and their implementation using Python.

Building an EmPyre with Python

BSidesLV
Add to list