Breaking into systems using Karmetasploit on backtrack 4



This video is about using karma exploit from Metasploit on Backtrack 4.An Attacker will setup his own fake Access Point in monitor mode, DHCP daemon and a web server daemon. Attacker runs Metasploit's karma exploit. 

The moment an IP address is assigned to the victim's PC, all the activity is logged at the attacker's machine including the URL visited and credentials used for mail and web access.