The information in this presentation is intended for educational use only.
Techniques shown should only be performed on your own network. Using these skills on a network without prior consent is illegal.
(Don’t be evil)
In this talk I present on the techniques that hackers use and how to keep your self safe.
Here is my presentation slides from Ohio Linux Fest on 10/8/2016 – https://bemushosting.com/present/kali-olf-2016-10-08/Kali-OLF_2016-10-08.html
A printable version of the slide are here: https://bemushosting.com/present/kali-olf-2016-10-08/Bemus-Kali-OLF2016.pdf
I also presented this at MUG on 3/8/2016 and MDLUG on 9/10/2016
Slides are available here: https://bemushosting.com/present/kali-mug-2016-03-08/Kali-MUG_2016-03-08.html
The presentation was recorded via Google Hangouts On-air and available on youtube.com: https://www.youtube.com/watch?v=0xNZ8I8JVII
The following topics are covered:
- Definition of Offensive security and Countermeasures
- The CIA triad
- Basic Security Countermeasures
- About Kali Linux
- Kali Linux Options
- Kali Linux Top 10
- Android RAT with MSF
- Scan computers using nmap
- Network Sniffing with macof and Wireshark
Info Gathering using Maltego
Network scanning using nmap
OS Fingerprinting using namp
Android remote backdoor RAT
Network listening using macof and Wireshark