Welcome Guest
THE HACKING TOAD
[ New messages · Members · Forum rules · Search · RSS ]
  • Page 1 of 1
  • 1
Video tutorials
PREETDate: Saturday, 2011-10-29, 6:36 PM | Message # 1
Sergeant
Group: Administrators
Messages: 36
Reputation: 5
Status: Offline
Hello All,
[b][b]Metasploit is probably one of the most useful tools to a hacker. Contains tons of well tested exploits which can be used with multiple payloads to break into systems. In this video series, I have tried to cover all the essential things one needs to know about Metasploit. I start from the very basics and slowly more towards covering intermediate and advanced functionality. I have already created over 300 mins of video.

Note that this series is still in progress and you can keep checking for the latest videos on SecurityTube http://www.securitytube.net

Below are the video links and a short description:

1. Metasploit Megaprimer (Exploitation Basics and need for Metasploit) Part 1

http://bit.ly/b2Y2pE

2. Metasploit Megaprimer (Getting Started with Metasploit) Part 2

http://bit.ly/bLgTOm

3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)

http://bit.ly/9sjqqH

4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)

http://bit.ly/97f1U3

5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)

http://bit.ly/anbODH

6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)

http://bit.ly/c4A4Eg

7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)

http://bit.ly/bT1uD5

8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)

http://bit.ly/dicJzI

9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)

http://bit.ly/asr1ML

10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)

http://bit.ly/bvCudb

11. Metasploit Megaprimer (Post Exploitation and Stealing Data) Part 11

http://bit.ly/auwtBm

12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)

http://bit.ly/a7n8nw

13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)

http://bit.ly/9mOztm

14. Metasploit Megaprimer Part 14 (Backdooring Executables)

http://bit.ly/bZxwgK

15. Metasploit Megaprimer Part 15 (Auxiliary Modules)

http://bit.ly/du779R

16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)

http://bit.ly/d7bdZi

Plea
se do let me know your f
 
predatorDate: Monday, 2012-01-30, 3:58 PM | Message # 2
Private
Group: Users
Messages: 11
Reputation: 2
Status: Offline
please write a proper blog entry for Metasploit!!!
 
arshDate: Friday, 2012-06-01, 4:53 PM | Message # 3
Private
Group: Administrators
Messages: 9
Reputation: 3
Status: Offline
sure! will do that soon..
 
  • Page 1 of 1
  • 1
Search:


Login form
Our poll
What do you use to access Net?
Total of answers: 6
Search