Академический Документы
Профессиональный Документы
Культура Документы
Ethical Hacking
Steve Bolt
Gaining access
Provides PROOF
Pivot points
To gain access:
Service side
Client side
GAINING ACCESS
Phishing
GAINING ACCESS
Other methods?
Once we know what programs are being used, we can check for
vulnerabilities to exploit
GAINING ACCESS
Metasploit Framework
X platform
Exploits
Payloads
Auxiliary
Post Modules
GAINING ACCESS
Metasploit
Documentation
User Interfaces
Modules
Other items
GAINING ACCESS
Metasploit
Launch Msconsole
Show exploits
Select payload
> show
payloads
Set parameters
Then Exploit
> exploit
GAINING ACCESS
Meterpreter
GAINING ACCESS
GAINING ACCESS
GAINING ACCESS
At Jobs
Cron jobs
GAINING ACCESS
LAB TIME......
GAINING ACCESS