VMware

Chain Exploitation & Weak Shares | Attack and Detect vs Splunk & Security Onion



This is the ultimate lab setup for learning both offensive and defensive skills.

In this live stream i will show you how to get initial access, show how exploiting one service can lead to the other (put 2&2 together) and show how weak shares can expose credentials.

You can practice on the machine by downloading and importing it in vmware workstation, fusion, player etc here:

source

 

To see the full content, share this page by clicking one of the buttons below

Related Articles

Leave a Reply