VMware
Chain Exploitation & Weak Shares | Attack and Detect vs Splunk & Security Onion
This is the ultimate lab setup for learning both offensive and defensive skills.
In this live stream i will show you how to get initial access, show how exploiting one service can lead to the other (put 2&2 together) and show how weak shares can expose credentials.
You can practice on the machine by downloading and importing it in vmware workstation, fusion, player etc here:
source
To see the full content, share this page by clicking one of the buttons below |