Metasploit

Metasploit

David Bombal via YouTube Direct link

▶️ We like win

1 of 46

1 of 46

▶️ We like win

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Metasploit

Automatically move to the next video in the Classroom when playback concludes

  1. 1 ▶️ We like win
  2. 2 ▶️ I am administrator
  3. 3 ▶️ Linux access
  4. 4 ▶️ Password hashes
  5. 5 ▶️ Introduction
  6. 6 ▶️ Metasploit framework overview
  7. 7 ▶️ Why is this one of your favourite tools?
  8. 8 ▶️ Windows and Linux
  9. 9 ▶️ This is a local lab
  10. 10 ▶️ Windows Metasploit demo
  11. 11 ▶️ Eternal Blue overview
  12. 12 ▶️ Start eternalblue
  13. 13 ▶️ Check attack viability
  14. 14 ▶️ Specify target (RHOSTS)
  15. 15 ▶️ Exploit (check hosts)
  16. 16 ▶️ Gain access
  17. 17 ▶️ Reverse shell
  18. 18 ▶️ Set rhosts
  19. 19 ▶️ Set payload
  20. 20 ▶️ Set lhost
  21. 21 ▶️ Set lport
  22. 22 ▶️ Run exploit
  23. 23 ▶️ Win
  24. 24 ▶️ Shell access gained
  25. 25 ▶️ Full Admin access
  26. 26 ▶️ Summary of what was done
  27. 27 ▶️ This is much easier - use automation
  28. 28 ▶️ Why did this work?
  29. 29 ▶️ What about Linux?
  30. 30 ▶️ Linux demo example
  31. 31 ▶️ Linux shell bug
  32. 32 ▶️ Use option
  33. 33 ▶️ Set header
  34. 34 ▶️ Set rhosts
  35. 35 ▶️ Set targeturi
  36. 36 ▶️ Set lhost
  37. 37 ▶️ Exploit
  38. 38 ▶️ shell created
  39. 39 ▶️ Make pretty
  40. 40 ▶️ Use Linux commands
  41. 41 ▶️ Which user account is used
  42. 42 ▶️ Got a remote shell
  43. 43 ▶️ Escalate priv
  44. 44 ▶️ Get admin and root accounts
  45. 45 ▶️ Summary of what we have done
  46. 46 ▶️ What other tools are you going to show us

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.