This process involves identifying the target systems and the goal, then reviewing the information available and undertaking available means to attain the goal.
A lve demonstration of techniques used in order to gain access to a system will be presented.
- Information Gathering
- Service Enumeration
- Vulnerability identification
- Maintaining Access
Kali/*nix + Metasploit + Armitage
Armitage exists as a client and a server that allow red team collaboration to happen. The Armitage client package is made available for Windows, MacOS X, and Linux.
And remember kids:
Don’t learn to hack, hack to learn!
Sat 7/11/15 15:00