top of page

​Assessing Common Attack Vectors

Section 1: Hands-On Demonstration

Part 1: Perform an Injection Attack

Make a screen capture showing the DOM XSS dialog box.

Screenshot_2.png

Make a screen capture showing the successful admin login

Screenshot_3.png

Make a screen capture showing the successful Reflected XSS injection.

Screenshot_4.png

Make a screen capture showing the user with the @owasp.org email.

Screenshot_5.png

Part 2: Perform a Malware Attack

Make a screen capture showing the msfvenom output.

Screenshot_6.png

​Make a screen capture showing the Opening malwarePayload.exe dialog box.

Screenshot_7.png

Make a screen capture showing the output of the sysinfo command.

Screenshot_8.png

Section 2: Applied Learning

Part 1: Perform a Distributed Denial-of-Service Attack

Make a screen capture showing the newly recruited hosts.

Screenshot_9.png

​Make a screen capture showing the drisst.org webpage.

Screenshot_10.png

Make a screen capture showing the failed connection to drisst.org

Screenshot_11.png

Make a screen capture showing the “PF states limit reached” error message.

Screenshot_12.png

Part 2: Perform a Social Engineering Attack

Make a screen capture showing the finished SET phishing email composition.

Screenshot_13.png

Make a screen capture showing the transaction.php page in the browser.  

​

Screenshot_14.png
bottom of page