Description:
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
The creator of this video has not given you permission to embed it on this domain. This is a Vimeo Plus feature.
:/
cant watch it and it works on the other 16
all videos a excellent. thank you for making this easy to understand for a newbie watchers. i can actually use this as a reference scenes i will be starting my course in BT4 PWB.. great job. keep it up..
will you continue the metaspolit megaprimer series ?
please continue it your videos are great , and i want to know your major
and thank you very much
demonstrate a windows 7 machine running everything and getting through it all, such as AV/firewall/firefox addons that detect things also
mostly on Windows 7 machines period since thats what is mostly used now in days in real life and MAC if you want
Excellent series.
One of the scenarios I would like to see is getting a foot hold on a Windows 7 box then traverses the network. The Win 7 is on its own subnet with AV and Client-Firewall. A dual honed server with IDS / IPS leads to another subnet. From their maybe hacking a mail server and web server. If keeping this open source - specifically I would like to see Snort used for the IDS.
Vivek, thank you again for a great video series!!!
Good vid, thanks Vivek.
very nice vivek.. keep it up.. very good refernce for us...
Another great megaprimer! Thanks for sharing all of this! o/
How to connect my host machine to to guest machine(virtual box) using putty... i always have to boot into backtrack to practice metasploit.......
Finished the Metasploit Megaprimer today and all I have to say is good work my friend!!! I look forward to additional videos for this Megaprimer (touching on the development side of Metasploit). Maybe some examples using Windows Vista/7 versus XP?
Again thanks for the great and very informative content!
Great video series...keep up the good work....please let us know when wil the next vid be up and also the next one on the sbh series.
Hi Vivek. First of all thank you for sharing your knowledge!. I have watched all the video series and all of them are Great!... I have become a follower of your video series. Please continue sharing your videos.
"Scenario Based Hacking" sounds as an interesting topic!! go ahead..!!
Do you have any twitter account?
Vivek, i have been glued to this series for the past few days, and i cant tell you how grateful i am that you shared you knowledge with us. thank you for your time and energy that went into this teaching. i look forward to future videos of such high quality and information. again thank you!
Gr8 much better then all the other stuff i found about MSF:D
This should be an official MSF Tutorial!!!! Ill buy u a drink:)
Excellent tutorials !! I just finished to watch all the series! and i think its a good introduction to hacking. Congratulations!!!
Thanks for all the comments guys! We have launched a SecurityTube Metasploit Framework Expert Certification today:
http://www.securitytube.net/smfe
The first 25 signups will receive discounted seats! Please hurry :)
Para conhecer o metasploit mais a fundo visite o fórum Amantes do Metasploit, lá você vai encontrar muito material em português
http://www.amantesdometasploit.com.br
hi dear vivek ramachandran.
i'm a beginer and follow your videos and learn many things from you, thanks for everythings.
dear vivek i follow WLAN-Security-Megaprimer videos and i need your slides, please if you can e-mails all of the power points slides about WLAN-Security-Megaprimer and other videos for me,i don't know your mail but i just know you are the best teacher that i have ever seen.
i know you follow and read comments plz tell your idea about it in this page or email me.
thanks again.
sir actually now onl i saw ur video , iam using vmware .
if i click exploit it just show three lines of exploit but not at all exploitin may i knw the reason.can u help me pla
Hi Vivek , i think u r rocket scientist in metasploite, boss u have created gr8 tutorials with good communication skill means any1 can understand, keep it up vivek. 1 suggestion 4 creating a tutorial on " windows/shell/reverse_tcp" becoz many firewall block meterpreter if u hacked target pc with windows shell then u be in "cmd.exe" then after how u will transfer ur files, exploits, priv escalation manually on target pc, its big challenge in live scenario and even u can't update ur payload from shell to meterpreter in WAN becoz firewall will allow,,,,,, GOOD JOB DONE VIVEK. waiting for your new tutorial
I agree completely with DW2054 post above. Would love to see a video that once a machine behind NAT /ROUTER / FIREWALL that this machine is than used to traverse the network and gain a foothold on systems within the network.