Quantcast
Viewing all articles
Browse latest Browse all 31

"Post-Exploitation with WCE" Presentation


This presentation describes the techniques WCE brings to penetration testers and how these can be used in different scenarios. Although originally targeted to college students studying information security, you might find useful information you didn't know about even if you are an experienced user of WCE or penetration tester.

Direct links:
Post-Exploitation with WCE (SPANISH)

Post-Exploitation with WCE (ENGLISH)

Viewing all articles
Browse latest Browse all 31

Trending Articles