Name: Mike Doyle @fe3mike

Title: Pivoting arbitrary tools with Socket Proxy

Abstract: An attack platform can host many tools for reconnaissance, enumeration, vulnerability analysis, and exploitation. These are all too frequently left at the doorstep of the target network once the first host is compromised. Socket Proxy is a post-exploitation pivot tool for leveraging the versatility of your attack platform in the network context of a compromised host.

Loading more stuff…

Hmm…it looks like things are taking a while to load. Try again?

Loading videos…