​Assessing Common Attack Vectors
Section 1: Hands-On Demonstration
Part 1: Perform an Injection Attack
Make a screen capture showing the DOM XSS dialog box.

Make a screen capture showing the successful admin login

Make a screen capture showing the successful Reflected XSS injection.

Make a screen capture showing the user with the @owasp.org email.

Part 2: Perform a Malware Attack
Make a screen capture showing the msfvenom output.

​Make a screen capture showing the Opening malwarePayload.exe dialog box.

Make a screen capture showing the output of the sysinfo command.

Section 2: Applied Learning
Part 1: Perform a Distributed Denial-of-Service Attack
Make a screen capture showing the newly recruited hosts.

​Make a screen capture showing the drisst.org webpage.

Make a screen capture showing the failed connection to drisst.org

Make a screen capture showing the “PF states limit reached” error message.

Part 2: Perform a Social Engineering Attack
Make a screen capture showing the finished SET phishing email composition.

Make a screen capture showing the transaction.php page in the browser.
​
