Post-Exploitation Fundamentals w/ Tyrone E. Wilson
Our discussion of the post-exploitation phase will focus on maintaining access, privilege escalation, domain enumeration, and pivoting.
Now that you have access to a target, what next? Our discussion of the post-exploitation phase will focus on maintaining access, privilege escalation, domain enumeration, and pivoting as we leverage the latest tools and techniques to create a persistent presence in a system.
Mr. Tyrone E. Wilson is a passionate information security professional with 26 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.
Wilson is also the organizer of The D.C. Cybersecurity Professionals. With over 9,500 members, it is the largest #Cybersecurity meetup group in the United States. In addition, Wilson is also on the Review Board of BSides NoVA, Howard University, and Hacker Halted and has presented and/or taught classes at many of the major tech conferences.5
Tyrone E. Wilson
Founder & CEO
CEH Master, eJPT, CySA+, Sec+, Net+
This session will be recorded and a copy of the video will be posted on this page as well as on our YouTube Channel.