@fab

notes

Pre-Requisites

We need three virtual machines to recreate this attack. I used virtual box to setup these virtual machines. All three machines should be on same subnet.

All three machines are in “Nat in network” mode. Attacker machine can be of any OS. Victim should be of Windows OS(any windows OS will do good for demo)

Read more...