Penetration Testing with Metasploit: A Comprehensive Tutorial | PT2

preview_player
Показать описание
Welcome to Part 2 of our Metasploit Penetration Testing Tutorial Series! In this video, we cover Metasploit's most important post-exploitation tools and techniques including payloads, pivoting techniques, establishing persistence, command and control, dissecting SAM database files,clearing system logs, and so much more. This video is users friendly for all skill levels, but we do suggest you watch part one of the series ahead of time, as this video focuses on post exploitation whereas the first video focuses on initial exploitation.

--

Chapters:

0:00 - 1:39 Intro and Session Info
1:40 - 7:50 Windows Sam Databases
7:50 - 11:10 Key Logging
11:11 - 15:58 Backdoor
15:59 - 17:10 Remote Desktop
17:11 - 20:20 Event Viewer and Closing Statements

---

--

Disclaimer: Hacking without permission is illegal. This channel is strictly for educational purposes only. We cover cybersecurity in the areas of ethical hacking and penetration testing to help make others aware and be better prepared to defend against cyber threats.

#metasploit #kalilinux #linux #pentesting #ethicalhacking
Рекомендации по теме
Комментарии
Автор

Really underrated YouTuber. I wish you success

madmax
Автор

This guy is my new favorite I’m watching all his videos. I need to tell ppl about this channel

snyhper_
Автор


Chapters:


1:39 Intro and Session Info
7:50 Windows Sam Databases
11:10 Key Logging
15:58 Backdoor
17:10 Remote Desktop
20:20 Event Viewer and Closing Statements


NNAdmin
Автор

Yeah bro underrated for sure. Id sure love a list of all those longer commands though.

greyburns
Автор

wish you the best brother, thanks for making this videos!

CodeHavox
Автор

These vidoes are great, not inly do you show the attack and exploit but also how to rectify and record the results, both sides of the show...this is what many of the youtubers dont do

ItsAnotherDayInParadise
Автор

Thank you for this vital tutorial. I need clarity, please. How did you get that rockyou.txt file you ran with John command?

nwosukingsley
Автор

So if i start up metasploit.. The correct exploit will be waiting already loaded, and the target IP address will already be filled in? I feel like you skipped some steps..?

mrjox
Автор

how to make some of my vm to be vulnarable to test ( everything is closed and that makes it so comp
licated

AntapTas