Главная
Study mode:
on
1
Intro
2
STEPHEN HAYWOOD
3
SHOUT OUT
4
DON'T TAKE NOTES
5
WHAT IS POST- EXPLOITATION?
6
POST-EXPLOITATION HAS THE BLING
7
POST-EXPLOITATION WITH METASPLOIT
8
HOW TO BUILD POST- EXPLOITATION MODULES
9
BASIC STRUCTURE
10
INITIALIZE
11
REGISTER OPTIONS
12
REGISTER ADVANCED OPTIONS
13
VALID OPTION TYPES
14
BUILD THE RUN METHOD
15
USE THE POST LIBRARIES
16
PROVIDING FEEDBACK
17
BUILDING POST- EXPLOITATION MODULES
18
STORE THE LOOT
19
CONTRIBUTING MODULES TO THE FRAMEWORK
20
READ THE GUIDELINES
21
FORK THE FRAMEWORK
22
ADD YOUR CODE
23
SUBMIT A PULL REQUEST
24
WHAT DID WE LEARN?
Description:
Explore post-exploitation techniques in Metasploit with this conference talk from Derbycon 2012. Dive into the fundamentals of post-exploitation, its importance in penetration testing, and how to leverage Metasploit's capabilities. Learn the structure of post-exploitation modules, including initialization, option registration, and run method implementation. Discover how to utilize post libraries, provide feedback, and store loot. Gain insights on contributing modules to the Metasploit framework, including guidelines, forking, and submitting pull requests. Enhance your understanding of advanced penetration testing methodologies and expand your cybersecurity skillset.

Introduction to Metasploit Post Exploitation Modules

Add to list