2 talks tagged Post-Exploitation from 2 chapters of BSides events worldwide. Techniques for maintaining access, evading detection, and pivoting within a compromised network after initial compromise