Lets pick up where we left off with the rootkit and post-exploitation video (http://www.youtube.com/watch?v=izv1b-BTQFw). Except, we are now doing incident response.
First you’ll see some normal live forensics on the victim and come up with nothing. Then we show how using network forensics techniques (looking at the victim from the […]
This is mainly post-expoitation demonstration, that first starts with a walk-through of exploiting a windows machine. Next, we walk through getting a copy of the web server’s home page and then modify it with an iframe that points to an exploit server. Anybody that browses to the victim webpage […]
In this video we will demonstrate how to crack WPA2 using the Airmon-ng suite. We will do it by:
Identifying an access point
Capturing traffic from that access point
Attempt to capture the handshake. We have two options for doing this.
We can wait for a client to connect […]