P4wnP1 Covert Channel demo for Confidence Conference 2020
Windows 10 victim in the background, Kali attacker in the foreground. Bottom window is "journalctl -xfu P4wnP1". Top left shell is metasploit catching a shell. Top right window is an HTTP server, serving pages via the P4wnP1 Raw HID pipe.
Видео P4wnP1 Covert Channel demo for Confidence Conference 2020 канала Rogan Dawes
Видео P4wnP1 Covert Channel demo for Confidence Conference 2020 канала Rogan Dawes
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Port of USaBUSe to Linux](https://i.ytimg.com/vi/73nBrUdfAow/default.jpg)
![Lion attacks Crocodile Part 1](https://i.ytimg.com/vi/gsyU_ZRjgKc/default.jpg)
![Lion attacks Crocodile part 2](https://i.ytimg.com/vi/lNIQM7572rk/default.jpg)
![Double sided tape removal](https://i.ytimg.com/vi/nbfnazUegCo/default.jpg)
![Stage 2 of the JSON intercept demo](https://i.ytimg.com/vi/eN3Akxn2zlg/default.jpg)
![Stage 3 of the JSON intercept demo](https://i.ytimg.com/vi/LDRSxOOx8GM/default.jpg)
![Mallet Demo](https://i.ytimg.com/vi/mrr8R1L82uA/default.jpg)
![Stage 4 of the JSON intercept demo](https://i.ytimg.com/vi/z3SCdaXHgp8/default.jpg)
![Musical printers](https://i.ytimg.com/vi/G61xCjxXMP0/default.jpg)
![Stage 1 of the JSON intercept demo](https://i.ytimg.com/vi/1bRlSo5YV_M/default.jpg)
![Stage 5 of the JSON intercept demo](https://i.ytimg.com/vi/5XBm9dw-N0c/default.jpg)