Privilege Escalation with the Metasploit Framework - Derbycon 2012

Privilege Escalation with the Metasploit Framework - Derbycon 2012

via YouTube Direct link

Shells

2 of 34

2 of 34

Shells

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Privilege Escalation with the Metasploit Framework - Derbycon 2012

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Shells
  3. 3 Community
  4. 4 Easier to write
  5. 5 Why privilege escalation
  6. 6 Linux example
  7. 7 Root Elevator
  8. 8 Exploit Local Module
  9. 9 Con contrived exploit
  10. 10 Con exploit method
  11. 11 Example
  12. 12 Nmap
  13. 13 Nmap Lua
  14. 14 Business Specific Structure
  15. 15 Writing the Exploit
  16. 16 Demo
  17. 17 Skeletor
  18. 18 Task
  19. 19 Exploit Changes
  20. 20 CRC Collision
  21. 21 Ruby vs C
  22. 22 MattAzzam
  23. 23 The Process
  24. 24 The Exploit
  25. 25 The Goo
  26. 26 Parse
  27. 27 Socks10page
  28. 28 Kernels
  29. 29 SMB Relay
  30. 30 Awesomesauce technique
  31. 31 Automatic Domain Authentication
  32. 32 Service Manager
  33. 33 Compile Shell
  34. 34 Exploits

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.