BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/4515954279055360/lesson/7cba9c734f01aaa405318eb2898704c7?ref=outlook-calendar
SUMMARY:Video - Establishing A VNC Shell Using Meterpreter
DTSTART;TZID=America/Los_Angeles:20260502T190000
DTEND;TZID=America/Los_Angeles:20260502T200000
LOCATION:https://www.learndesk.us/class/4515954279055360/lesson/7cba9c734f01aaa405318eb2898704c7?ref=outlook-calendar
DESCRIPTION: In this lab, we see how easy Meterpreter can be used to establish a reverse shell with Windows XP using a well-known SMB exploit. We will also see how to detect any countermeasures that may be running on the remote target. We will establish a remote desktop session using a VNC payload and capture keystrokes to include logon passwords using Meterpreter.

https://www.learndesk.us/class/4515954279055360/lesson/7cba9c734f01aaa405318eb2898704c7?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR