PREET | Date: Saturday, 2011-10-29, 6:36 PM | Message # 1 |
Sergeant
Group: Administrators
Messages: 36
Status: Offline
| Hello All, [b][b]Metasploit is probably one of the most useful tools to a hacker. Contains tons of well tested exploits which can be used with multiple payloads to break into systems. In this video series, I have tried to cover all the essential things one needs to know about Metasploit. I start from the very basics and slowly more towards covering intermediate and advanced functionality. I have already created over 300 mins of video.
Note that this series is still in progress and you can keep checking for the latest videos on SecurityTube http://www.securitytube.net
Below are the video links and a short description:
1. Metasploit Megaprimer (Exploitation Basics and need for Metasploit) Part 1
http://bit.ly/b2Y2pE
2. Metasploit Megaprimer (Getting Started with Metasploit) Part 2
http://bit.ly/bLgTOm
3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)
http://bit.ly/9sjqqH
4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)
http://bit.ly/97f1U3
5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)
http://bit.ly/anbODH
6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)
http://bit.ly/c4A4Eg
7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)
http://bit.ly/bT1uD5
8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)
http://bit.ly/dicJzI
9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)
http://bit.ly/asr1ML
10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)
http://bit.ly/bvCudb
11. Metasploit Megaprimer (Post Exploitation and Stealing Data) Part 11
http://bit.ly/auwtBm
12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)
http://bit.ly/a7n8nw
13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)
http://bit.ly/9mOztm
14. Metasploit Megaprimer Part 14 (Backdooring Executables)
http://bit.ly/bZxwgK
15. Metasploit Megaprimer Part 15 (Auxiliary Modules)
http://bit.ly/du779R
16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)
http://bit.ly/d7bdZi
Please do let me know your f
|
|
| |
predator | Date: Monday, 2012-01-30, 3:58 PM | Message # 2 |
Private
Group: Users
Messages: 11
Status: Offline
| please write a proper blog entry for Metasploit!!!
|
|
| |
arsh | Date: Friday, 2012-06-01, 4:53 PM | Message # 3 |
Private
Group: Administrators
Messages: 9
Status: Offline
| sure! will do that soon..
|
|
| |