YoVDO

Metasploit

Offered By: David Bombal via YouTube

Tags

Metasploit Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Privilege Escalation Courses

Course Description

Overview

Gain hands-on experience with Metasploit, one of the most powerful penetration testing tools, in this comprehensive 34-minute video tutorial. Learn how to exploit vulnerabilities in both Windows and Linux servers using the Metasploit framework. Follow along as the instructor demonstrates step-by-step how to gain unauthorized access, obtain reverse shells, and escalate privileges on target systems. Explore key concepts like the EternalBlue exploit, payload configuration, and post-exploitation techniques. Understand the importance of ethical hacking practices and the use of local lab environments for testing. By the end of this tutorial, acquire practical skills in using Metasploit for cybersecurity assessments and penetration testing scenarios.

Syllabus

▶️ We like win.
▶️ I am administrator.
▶️ Linux access.
▶️ Password hashes.
▶️ Introduction.
▶️ Metasploit framework overview.
▶️ Why is this one of your favourite tools?.
▶️ Windows and Linux.
▶️ This is a local lab.
▶️ Windows Metasploit demo.
▶️ Eternal Blue overview.
▶️ Start eternalblue.
▶️ Check attack viability.
▶️ Specify target (RHOSTS).
▶️ Exploit (check hosts).
▶️ Gain access.
▶️ Reverse shell.
▶️ Set rhosts.
▶️ Set payload.
▶️ Set lhost.
▶️ Set lport.
▶️ Run exploit.
▶️ Win.
▶️ Shell access gained.
▶️ Full Admin access.
▶️ Summary of what was done.
▶️ This is much easier - use automation.
▶️ Why did this work?.
▶️ What about Linux?.
▶️ Linux demo example.
▶️ Linux shell bug.
▶️ Use option.
▶️ Set header.
▶️ Set rhosts.
▶️ Set targeturi.
▶️ Set lhost.
▶️ Exploit.
▶️ shell created.
▶️ Make pretty.
▶️ Use Linux commands.
▶️ Which user account is used.
▶️ Got a remote shell .
▶️ Escalate priv.
▶️ Get admin and root accounts.
▶️ Summary of what we have done.
▶️ What other tools are you going to show us.


Taught by

David Bombal

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy