11057359 442123105968115 1742217270355224918 n

This process involves identifying the target systems and the goal, then reviewing the information available and undertaking available means to attain the goal.
A lve demonstration of techniques used in order to gain access to a system will be presented.


  1. Information Gathering
  2. Service Enumeration
  3. Vulnerability identification
  4. Penetration
  5. Maintaining Access
  6. HouseKeeping

Kali/*nix + Metasploit + Armitage

Armitage exists as a client and a server that allow red team collaboration to happen. The Armitage client package is made available for Windows, MacOS X, and Linux.


And remember kids:
Don’t learn to hack, hack to learn!


Sat 7/11/15 15:00


Noviji Post Stariji Post