Description:
We introduced Scenario based Hacking in the
Metasploit Megaprimer Part 17. Please have a look there first before you begin this series, to understand the context. This is Part 2a of Scenario Based Hacking (SBH).
Please begin by watching Part 1, if you have not already done so.In Part 2a, we will look at the case in which the victim is behind a NAT. The victim is unpatched, has no AV, but the Attacker cannot reach the victim directly, as it is behind a NAT. We will see how to use client side exploits to deal with this case. We call this video Part 2a, as we will discuss multiple techniques to break into the victim which is behind a NAT.
Please leave your comments behind and let me know which scenarios you would like me to demonstrate.
In the next video, we will create trojan executables with payloads to break into a victim behind a NAT.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments:
good video once again, i couldn't help noticing that none of the videos dealth with an AV being present. For ex. symantec endpoint protection is pretty hard to bypass, even with encoding an exe or social engineering. Would have really liked to see some videos dealing with AV. None the less, good series :)!
GREAT work.. You know how to teach!!
How can i configure virtualBox to test this tutorial, specially the network settings for the hacker machine and for the victim ????
Hi,
Awesome work. i like your videos. I am having trouble in exploitation when the Firewall and AV is running on the system. nowadays people use better AV(security essentials,avira etc) and firewall is enabled. The exploits dont work if the firewall is enabled and trojan/backdoors are detected if the AV is running. Can you please suggest more methods to avoid these in a real life scenario
Thnx boss