We just created a new video that demonstrates how to use the Saint Vulnerability Scanner and then take that data and Turn it into an Exploit.
This is a good example of how a hacker could take over your machine. It is also a great example on what actually happens during a Vulnerability and Penetration Test.
0