11057359 442123105968115 1742217270355224918 n

This process involves identifying the target systems and the goal, then reviewing the information available and undertaking available means to attain the goal.
A lve demonstration of techniques used in order to gain access to a system will be presented.

METHODS COVERED:

  1. Information Gathering
  2. Service Enumeration
  3. Vulnerability identification
  4. Penetration
  5. Maintaining Access
  6. HouseKeeping


PREREQUISITES:
Kali/*nix + Metasploit + Armitage

Armitage exists as a client and a server that allow red team collaboration to happen. The Armitage client package is made available for Windows, MacOS X, and Linux.

Tutorial:
http://www.fastandeasyhacking.com/manual#1


And remember kids:
Don’t learn to hack, hack to learn!

 

Sat 7/11/15 15:00

 

Noviji Post Stariji Post