21

Metasploit with sholay kick

Embed Size (px)

Citation preview

Page 1: Metasploit with sholay kick
Page 2: Metasploit with sholay kick

2Patching Zaroori hai

Page 3: Metasploit with sholay kick

Story, Screen play and Direction

Satish and Rajesh

Page 4: Metasploit with sholay kick

Starring…Thakur

Founder of Thakur Software

Ltd

Page 5: Metasploit with sholay kick

Starring…Jai

Script Kiddy/Hacker

Linux Specialist

Page 6: Metasploit with sholay kick

Starring…Veeru

Script Kiddy

Windows Specialist

Page 7: Metasploit with sholay kick

Starring…Bhasanthi

CEO of Thakur Software Ltd

Page 8: Metasploit with sholay kick

Starring…Gabber

He is the Villain

Thakur’s Enemy

Page 9: Metasploit with sholay kick

Thakur softwares…

Page 10: Metasploit with sholay kick

Finally escaped! Thakur, your

bad days started..

Page 11: Metasploit with sholay kick

I can suggest an hack. But we need to disable there firewall and antivirus to

get into there system

How can I steal the Bionic software

Do you have any hack to disable

firewall and antivirus

I can try, but would take some time

I don’t have time. I will use social engineering to

disable there firewall and antivirus

Page 12: Metasploit with sholay kick

Payback points

redemption

Wow! New movies from

itunesLet me check

my mails

Page 13: Metasploit with sholay kick

Demo

Page 14: Metasploit with sholay kick
Page 15: Metasploit with sholay kick

Who might have taken?

Oh no! What will happen to

my Keynote?

Our system got hacked and

someone stole our bionic software

How about jai and veeru

Bhasanti! You know any one to get our software

back from Gabber

Page 16: Metasploit with sholay kick

Tomorrow is my keynote. I need my

software.

Page 17: Metasploit with sholay kick

Let’s get to work Do you have plan in place

Let me get into gabbers system using phishing

techniques

Page 18: Metasploit with sholay kick
Page 19: Metasploit with sholay kick
Page 20: Metasploit with sholay kick

The End

Page 21: Metasploit with sholay kick

Quiz1) How did firewall and antivirus got disabled?2) Diff bet Social engineering vs Phishing3) What to do when you receive a phishing mail?4) How to avoid this attack?5) Key takeaway from this session?