The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive, and security research.
Below are the video links and a short description:
1. Metasploit Megaprimer Part 1 (Exploitation Basics and need for Metasploit)
http://bit.ly/b2Y2pE
2. Metasploit Megaprimer Part 2 (Getting Started with Metasploit)
http://bit.ly/bLgTOm
3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)
http://bit.ly/9sjqqH
4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)
http://bit.ly/97f1U3
5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)
http://bit.ly/anbODH
6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)
http://bit.ly/c4A4Eg
7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)
http://bit.ly/bT1uD5
8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)
http://bit.ly/dicJzI
9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)
http://bit.ly/asr1ML
10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)
http://bit.ly/bvCudb
11. Metasploit Megaprimer (Post Exploitation and Stealing Data) Part 11
http://bit.ly/auwtBm
12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)
http://bit.ly/a7n8nw
13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)
http://bit.ly/9mOztm
14. Metasploit Megaprimer Part 14 (Backdooring Executables)
http://bit.ly/bZxwgK
15. Metasploit Megaprimer Part 15 (Auxiliary Modules)
http://bit.ly/du779R
16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)
http://bit.ly/d7bdZi
17 Metasploit Demo
Man Great Videos Bro Love it man i am basic in metasploit now i will learn with ur videos help thank you very much
ReplyDeletehey mate how do u setup the windows machine in virtual box in the 1st video. When i try rpc dcom exploit with the ip it wont take it says connection refused can u explain that please...
ReplyDeletehttp://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
ReplyDelete