Главная
Study mode:
on
1
Intro
2
Shells
3
Community
4
Easier to write
5
Why privilege escalation
6
Linux example
7
Root Elevator
8
Exploit Local Module
9
Con contrived exploit
10
Con exploit method
11
Example
12
Nmap
13
Nmap Lua
14
Business Specific Structure
15
Writing the Exploit
16
Demo
17
Skeletor
18
Task
19
Exploit Changes
20
CRC Collision
21
Ruby vs C
22
MattAzzam
23
The Process
24
The Exploit
25
The Goo
26
Parse
27
Socks10page
28
Kernels
29
SMB Relay
30
Awesomesauce technique
31
Automatic Domain Authentication
32
Service Manager
33
Compile Shell
34
Exploits
Description:
Explore privilege escalation techniques using the Metasploit Framework in this 50-minute conference talk from Derbycon 2012. Dive into topics such as Linux root elevation, exploit local modules, and Nmap Lua scripting. Learn about business-specific exploit writing, CRC collision techniques, and the differences between Ruby and C implementations. Discover advanced concepts like kernel exploits, SMB relay attacks, and automatic domain authentication. Gain insights into service manager manipulation and shell exploit compilation for enhancing your penetration testing skills.

Privilege Escalation with the Metasploit Framework - Derbycon 2012

Add to list
0:00 / 0:00