Attacking the Organization: Deploy Malicious Applications

“Now that we have configured the Splunk apps we can now setup our handler and begin expanding our influence within the victim environment.”
-Ryan, TBG Security‘s Director of Security Engineering

[videoframes src=”https://youtu.be/q2y6H9AyYOo” skin=”17″ controls=”1″ headline_color=”#000000″ headline_size=”22″]
 

Get In Touch

Have a question? We’re here to help.

Contact Us