Jump to content
Fed0t

Metasploit (Video Tutorials)

Recommended Posts

Posted

Metasploit is one of the tool that every hacker have in his tool kit which contains lots of modules and exploits which can be used with various payloads to break into boxes.

In this video series you will go through the metasploit framework starting from the very basics of metasploit and slowly more towards intermediate and advanced functionality, including creation of Meterpreter scripts and extending the framework.

Video Series Link (Original source)

1. Metasploit Megaprimer Part 1 (Exploitation Basics and need for Metasploit)

Metasploit Megaprimer (Exploitation Basics And Need For Metasploit) Part 1

2. Metasploit Megaprimer Part 2 (Getting Started with Metasploit)

Metasploit Megaprimer (Getting Started With Metasploit) Part 2

3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)

Metasploit Megaprimer Part 3 (Meterpreter Basics And Using Stdapi)

4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)

Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi And Priv)

5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)

Metasploit Megaprimer Part 5 (Understanding Windows Tokens And Meterpreter Incognito)

6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)

Metasploit Megaprimer Part 6 (Espia And Sniffer Extensions With Meterpreter Scripts)

7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)

Metasploit Megaprimer Part 7 (Metasploit Database Integration And Automating Exploitation)

8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)

Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)

9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)

Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)

10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)

Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion And Av Killing)

11. Metasploit Megaprimer Part 11 (Post Exploitation and Stealing Data)

Metasploit Megaprimer (Post Exploitation And Stealing Data) Part 11

12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)

Metasploit Megaprimer Part 12 (Post Exploitation Backdoors And Rootkits)

13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)

Metasploit Megaprimer Part 13 (Post Exploitation Pivoting And Port Forwarding)

14. Metasploit Megaprimer Part 14 (Backdooring Executables)

Metasploit Megaprimer Part 14 (Backdooring Executables)

15. Metasploit Megaprimer Part 15 (Auxiliary Modules)

Metasploit Megaprimer Part 15 (Auxiliary Modules)

16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)

Metasploit Megaprimer Part 16 (Pass The Hash Attack)

17. Metasploit Megaprimer Part 17 (Scenario Based Hacking)

Metasploit Megaprimer Part 17 (Scenario Based Hacking)

Download (Part - Part )

Download for free on Filesonic.com

Download for free on Filesonic.com

Download for free on Filesonic.com

Download for free on Filesonic.com

Download for free on Filesonic.com

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...