Hello All,
Metasploit is probably one of the most useful tools to a hacker. Contains tons of well tested exploits which can be used with multiple payloads to break into systems. In this video series, I have tried to cover all the essential things one needs to know about Metasploit. I start from the very basics and slowly more towards covering intermediate and advanced functionality. I have already created over 300 mins of video.
Below are the video links and a short description:
1. Metasploit Megaprimer (Exploitation Basics and need for Metasploit) Part 1
Part 1
2. Metasploit Megaprimer (Getting Started with Metasploit) Part 2
Part 2
3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)
Part 3
4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)
Part 4
5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)
Part 5
6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)
Part 6
7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)
Part 7
8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)
Part 8
9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)
Part 9
10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)
Part 10
11. Metasploit Megaprimer (Post Exploitation and Stealing Data) Part 11
Part 11
12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)
Part 12
13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)
Part 13
14. Metasploit Megaprimer Part 14 (Backdooring Executables)
Part 14
15. Metasploit Megaprimer Part 15 (Auxiliary Modules)
Part 15
16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)
Part 16
Note that this series is still in progress and you can keep checking for the latest videos on SecurityTube http://www.securitytube.net
Metasploit is probably one of the most useful tools to a hacker. Contains tons of well tested exploits which can be used with multiple payloads to break into systems. In this video series, I have tried to cover all the essential things one needs to know about Metasploit. I start from the very basics and slowly more towards covering intermediate and advanced functionality. I have already created over 300 mins of video.
Below are the video links and a short description:
1. Metasploit Megaprimer (Exploitation Basics and need for Metasploit) Part 1
Part 1
2. Metasploit Megaprimer (Getting Started with Metasploit) Part 2
Part 2
3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)
Part 3
4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)
Part 4
5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)
Part 5
6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)
Part 6
7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)
Part 7
8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)
Part 8
9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)
Part 9
10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)
Part 10
11. Metasploit Megaprimer (Post Exploitation and Stealing Data) Part 11
Part 11
12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)
Part 12
13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)
Part 13
14. Metasploit Megaprimer Part 14 (Backdooring Executables)
Part 14
15. Metasploit Megaprimer Part 15 (Auxiliary Modules)
Part 15
16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)
Part 16
Note that this series is still in progress and you can keep checking for the latest videos on SecurityTube http://www.securitytube.net
No comments:
Post a Comment