Overview
Syllabus
Countdown
Intro
Null Byte Cat Cameo
What We're Doing Today
Metasploit and Attack Setup
Phishing E-mail
Command and Control
Exploiting the Target Machine
Reverse DNS Look-ups
Password Spray
Ticket Harvesting Attack
Hash Cracking
We Have the Password, Now What?
Finding the most Sensitive Data
Launching the Ransomeware
Defending Against this Attack
What did Kilian Study
Kody uses a Macbook
Best Programming Languages
Anti-virus
What VM do we use for the Labs
Zip Bomb
Hacker Ethics
Malware Honeypots
Closing Thoughts
Taught by
SecurityFWD