Notes

Setting up Beats on Capstone

This is done for logging that attacks before attacking

Attacking capstone from kali

Access Forbiden

Username:Password login

Part 3

Identifying offensive traffic

Find the requests for the hidden directory

Identify the brute force attack

Find the WebDav session

Identify reverse shell and meterpreter traffic


Revision #1
Created 2025-11-25 18:35:38 UTC by David Rizzo
Updated 2025-11-25 18:35:50 UTC by David Rizzo