Selling your Information Security Team Part 6

If you are followed this series so you can present a similar demonstration, this VM will be used by the audience member that volunteers to be the victim.  We are not going to patch it so we can take advantage of some vulnerabilities that exist in the SP1 build.

We are on to building the Victim VM.  This VM will be built with Window 7 SP1 32-bit.  Be aware that when SP1 was released, these vulnerabilities were either not known or were later zero day discoveries.  More on the vulnerabilities in SP1 later during the post on the attacker VM.

Continue reading “Selling your Information Security Team Part 6”