YoVDO

Metasploit

Offered By: David Bombal via YouTube

Tags

Metasploit Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Privilege Escalation Courses

Course Description

Overview

Gain hands-on experience with Metasploit, one of the most powerful penetration testing tools, in this comprehensive 34-minute video tutorial. Learn how to exploit vulnerabilities in both Windows and Linux servers using the Metasploit framework. Follow along as the instructor demonstrates step-by-step how to gain unauthorized access, obtain reverse shells, and escalate privileges on target systems. Explore key concepts like the EternalBlue exploit, payload configuration, and post-exploitation techniques. Understand the importance of ethical hacking practices and the use of local lab environments for testing. By the end of this tutorial, acquire practical skills in using Metasploit for cybersecurity assessments and penetration testing scenarios.

Syllabus

▶️ We like win.
▶️ I am administrator.
▶️ Linux access.
▶️ Password hashes.
▶️ Introduction.
▶️ Metasploit framework overview.
▶️ Why is this one of your favourite tools?.
▶️ Windows and Linux.
▶️ This is a local lab.
▶️ Windows Metasploit demo.
▶️ Eternal Blue overview.
▶️ Start eternalblue.
▶️ Check attack viability.
▶️ Specify target (RHOSTS).
▶️ Exploit (check hosts).
▶️ Gain access.
▶️ Reverse shell.
▶️ Set rhosts.
▶️ Set payload.
▶️ Set lhost.
▶️ Set lport.
▶️ Run exploit.
▶️ Win.
▶️ Shell access gained.
▶️ Full Admin access.
▶️ Summary of what was done.
▶️ This is much easier - use automation.
▶️ Why did this work?.
▶️ What about Linux?.
▶️ Linux demo example.
▶️ Linux shell bug.
▶️ Use option.
▶️ Set header.
▶️ Set rhosts.
▶️ Set targeturi.
▶️ Set lhost.
▶️ Exploit.
▶️ shell created.
▶️ Make pretty.
▶️ Use Linux commands.
▶️ Which user account is used.
▶️ Got a remote shell .
▶️ Escalate priv.
▶️ Get admin and root accounts.
▶️ Summary of what we have done.
▶️ What other tools are you going to show us.


Taught by

David Bombal

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent