BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/4515954279055360/lesson/6d85dafe3d26e7a285dfbfcdeac7f306?ref=outlook-calendar
SUMMARY:Lab - Establishing A VNC Shell Using Meterpreter
DTSTART;TZID=America/Los_Angeles:20260501T190000
DTEND;TZID=America/Los_Angeles:20260501T200000
LOCATION:https://www.learndesk.us/class/4515954279055360/lesson/6d85dafe3d26e7a285dfbfcdeac7f306?ref=outlook-calendar
DESCRIPTION: In this lab, we see how easy Meterpreter can be used to establish a reverse shell with Windows XP using a well-known SMB exploit. We will also see how to detect any countermeasures that may be running on the remote target. We will establish a remote desktop session using a VNC payload and capture keystrokes to include logon passwords using Meterpreter.

https://www.learndesk.us/class/4515954279055360/lesson/6d85dafe3d26e7a285dfbfcdeac7f306?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR