Добавить
Уведомления

Tyrone E. Wilson - From Passive Reconnaissance to Compromise with OSINT and Third-Party Apps

Join us to learn how attackers use Open Source Intelligence (OSINT) and third-party apps to obtain information that eventually leads to a successful corporate or home network compromise. Tyrone will demonstrate how to use various tools and an attacker's mindset, to gather relevant information without getting caught. We will see the entire information attack process from start to finish.

12+
12 просмотров
Год назад
12+
12 просмотров
Год назад

Join us to learn how attackers use Open Source Intelligence (OSINT) and third-party apps to obtain information that eventually leads to a successful corporate or home network compromise. Tyrone will demonstrate how to use various tools and an attacker's mindset, to gather relevant information without getting caught. We will see the entire information attack process from start to finish.

, чтобы оставлять комментарии