SLIDE 1
- The problem (cloud backup/synchronization)
- The solution (DropSmack)
- Next steps
- Insecure Authentication Case Study
- Post Exploitation Activities
- Where to go from here
Post Exploitation Operations with Cloud Synchronization Services - - PowerPoint PPT Presentation
Post Exploitation Operations with Cloud Synchronization Services Jake Williams jwilliams@csr-group.com @MalwareJake Agenda The problem (cloud backup/synchronization) The solution (DropSmack) Next steps Insecure Authentication
– Everything else is just cake – But the cake is a lie!