Thursday, May 13, 2010

Karmetasploit on Backtrack4

This video is about using karma exploit from Metasploit on Backtrack 4. An Attacker will setup his own fake Access Point in monitor mode, DHCP daemon and a web server daemon. Attacker runs Metasploit's karma exploit. The moment an IP address is assigned to the victim's PC, all the activity is logged at the attacker's machine including the URL visited and credentials used for mail and web access.

1 comment:

Certified Ethical Hacker Network Security Internet Security Computer Security Wireless Network Security