postexploitation, tools, telegram — 18 May 2016 bt2: leveraging Telegram as a command & control platform Introduction At Blaze Security we are always looking for new ways to further improve our engagements. As every penetration tester knows, post-exploitation is a crucial step for successful compromise and further penetration deep inside the network. Maintaining a strong foothold...