Learning the ways of the hacker is no easy task however, Brandon Sakamoto, makes it look like a cakewalk! Starting off with what it means to have a machine exploited, our host shows how to first exploit the system using mulitple tools to your disposal through Kali Linux. Once everyone has understood some of the various ways to exploit a system, our host began to explain the main topic at hand, “Post-Explotation”.
Using the metasploit meterpreter shell, students were able to understand the concepts of Privilege Escalation, Maintaining Access, Data Harvesting, and even Weak Password Cracking. Of course, all of these concepts were talked under how to perform each LEGALLY with the use of a Virtual Machine and a private network, which meant no live networks were harmed in the making of this workshop!
If interested in learning about Penetration Testing or anything Cyber Security related, Join one the many workshops SWIFT has to offer! You won’t regret it!