From Security Weekly Wiki
Jump to navigationJump to search
  • Use Beef and a XSS vuln to show how to hook a broswer and deploy a metasploit payload
  • Any new feature in Metasploit 3.2
  • Reading/cloning RFID tags for authentication systems (not jut EN4xxx series cards) - [I'm working on this right now - Larry]
  • removing/cleaning metadata