To use this video in a commercial player or in broadcasts, please email firstname.lastname@example.org
If you didn't see the original here it is: www.youtube.com/watch
This is not a how to, but a demo. I'll be hacking into the computers in the back, that are on their own network. if you google the tools below you could certainly figure out how to do this yourself.
I did my best to edit out my hashes, and waiting time. Entire hack from beginning to end took about 2 hours. Once inside you have as much control as the owner of the computer.
*Metasploit (Armitage) for brevity and aesthetic purposes