Главная
Study mode:
on
1
▶️ We like win
2
▶️ I am administrator
3
▶️ Linux access
4
▶️ Password hashes
5
▶️ Introduction
6
▶️ Metasploit framework overview
7
▶️ Why is this one of your favourite tools?
8
▶️ Windows and Linux
9
▶️ This is a local lab
10
▶️ Windows Metasploit demo
11
▶️ Eternal Blue overview
12
▶️ Start eternalblue
13
▶️ Check attack viability
14
▶️ Specify target (RHOSTS)
15
▶️ Exploit (check hosts)
16
▶️ Gain access
17
▶️ Reverse shell
18
▶️ Set rhosts
19
▶️ Set payload
20
▶️ Set lhost
21
▶️ Set lport
22
▶️ Run exploit
23
▶️ Win
24
▶️ Shell access gained
25
▶️ Full Admin access
26
▶️ Summary of what was done
27
▶️ This is much easier - use automation
28
▶️ Why did this work?
29
▶️ What about Linux?
30
▶️ Linux demo example
31
▶️ Linux shell bug
32
▶️ Use option
33
▶️ Set header
34
▶️ Set rhosts
35
▶️ Set targeturi
36
▶️ Set lhost
37
▶️ Exploit
38
▶️ shell created
39
▶️ Make pretty
40
▶️ Use Linux commands
41
▶️ Which user account is used
42
▶️ Got a remote shell
43
▶️ Escalate priv
44
▶️ Get admin and root accounts
45
▶️ Summary of what we have done
46
▶️ What other tools are you going to show us
Description:
Gain hands-on experience with Metasploit, one of the most powerful penetration testing tools, in this comprehensive 34-minute video tutorial. Learn how to exploit vulnerabilities in both Windows and Linux servers using the Metasploit framework. Follow along as the instructor demonstrates step-by-step how to gain unauthorized access, obtain reverse shells, and escalate privileges on target systems. Explore key concepts like the EternalBlue exploit, payload configuration, and post-exploitation techniques. Understand the importance of ethical hacking practices and the use of local lab environments for testing. By the end of this tutorial, acquire practical skills in using Metasploit for cybersecurity assessments and penetration testing scenarios.

Metasploit

David Bombal
Add to list
0:00 / 0:00