EvilZone
Hacking and Security => Hacking and Security => : bluephantom December 16, 2011, 05:01:33 PM
-
Video Series Link (Original source)
1. Metasploit Megaprimer Part 1 (Exploitation Basics and need for Metasploit)
http://www.securitytube.net/video/1175 (http://www.securitytube.net/video/1175)
2. Metasploit Megaprimer Part 2 (Getting Started with Metasploit)
http://www.securitytube.net/video/1176 (http://www.securitytube.net/video/1176)
3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi)
http://www.securitytube.net/video/1181 (http://www.securitytube.net/video/1181)
4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv)
http://www.securitytube.net/video/1182 (http://www.securitytube.net/video/1182)
5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito)
http://www.securitytube.net/video/1183 (http://www.securitytube.net/video/1183)
6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts)
http://www.securitytube.net/video/1184 (http://www.securitytube.net/video/1184)
7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation)
http://www.securitytube.net/video/1185 (http://www.securitytube.net/video/1185)
8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu)
http://www.securitytube.net/video/1187 (http://www.securitytube.net/video/1187)
9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation)
http://www.securitytube.net/video/1188 (http://www.securitytube.net/video/1188)
10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing)
http://www.securitytube.net/video/1189 (http://www.securitytube.net/video/1189)
11. Metasploit Megaprimer Part 11 (Post Exploitation and Stealing Data)
http://www.securitytube.net/video/1190 (http://www.securitytube.net/video/1190)
12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits)
http://www.securitytube.net/video/1191 (http://www.securitytube.net/video/1191)
13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding)
http://www.securitytube.net/video/1192 (http://www.securitytube.net/video/1192)
14. Metasploit Megaprimer Part 14 (Backdooring Executables)
http://www.securitytube.net/video/1198 (http://www.securitytube.net/video/1198)
15. Metasploit Megaprimer Part 15 (Auxiliary Modules)
http://www.securitytube.net/video/1199 (http://www.securitytube.net/video/1199)
16. Metasploit Megaprimer Part 16 (Pass the Hash Attack)
http://www.securitytube.net/video/1215 (http://www.securitytube.net/video/1215)
17. Metasploit Megaprimer Part 17 (Scenario Based Hacking)
http://www.securitytube.net/video/1219 (http://www.securitytube.net/video/1219)
-
I recommend all the Vivek's videos especially the megaprimer exploit research, this dude is awesome
-
Jesus guys, you suck at making good subjects.