Chain Exploitation & Weak Shares | Attack and Detect vs Splunk & Security Onion



This is the ultimate lab setup for learning both offensive and defensive skills.

In this live stream i will show you how to get initial access, show how exploiting one service can lead to the other (put 2&2 together) and show how weak shares can expose credentials.

You can practice on the machine by downloading and importing it in vmware workstation, fusion, player etc here:

source

Exit mobile version