This process involves identifying the target systems and the goal, then reviewing the information available and undertaking available means to attain the goal.
A lve demonstration of techniques used in order to gain access to a system will be presented.
METHODS COVERED:
- Information Gathering
- Service Enumeration
- Vulnerability identification
- Penetration
- Maintaining Access
- HouseKeeping
—
PREREQUISITES:
Kali/*nix + Metasploit + Armitage
Armitage exists as a client and a server that allow red team collaboration to happen. The Armitage client package is made available for Windows, MacOS X, and Linux.
Tutorial:
http://www.fastandeasyhacking.com/manual#1
—
And remember kids:
Don’t learn to hack, hack to learn!
Sat 7/11/15 15:00