You know the impressive visuals from TV series and movies. The hacker opens a black console window, types fast on the keyboard and suddenly has root on the target system, saving the day. But how does this look like in reality? Let me show you how this might be possible.
You know the impressive visuals from TV series and movies. The hacker opens a black console window, types fast on the keyboard and suddenly has root on the target system, saving the day. But how does this look like in reality?
If you drop by with a Laptop running "Kali Linux" either from USB-Stick or from within a virtual machine, I will walk you through the necessary steps. From analysing the target system, finding exploits, on to successfully hacking the "victim" using metasploit. And if you are quick enough and behave, we might even get so far as to remotely crashing the system.
This is an introductory level workshop targeted at a novice/beginner level audience that wants to learn how "hacking" actually works. InfoSec personnel and other "professionals" attending this session will get shanghaied into supporting the other attendees.
Prerequisites: Bring your own/a Laptop running a recent version of Kali-Linux inside a virtual machine or from a USB stick.