Completed
Example
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Privilege Escalation with the Metasploit Framework - Derbycon 2012
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Shells
- 3 Community
- 4 Easier to write
- 5 Why privilege escalation
- 6 Linux example
- 7 Root Elevator
- 8 Exploit Local Module
- 9 Con contrived exploit
- 10 Con exploit method
- 11 Example
- 12 Nmap
- 13 Nmap Lua
- 14 Business Specific Structure
- 15 Writing the Exploit
- 16 Demo
- 17 Skeletor
- 18 Task
- 19 Exploit Changes
- 20 CRC Collision
- 21 Ruby vs C
- 22 MattAzzam
- 23 The Process
- 24 The Exploit
- 25 The Goo
- 26 Parse
- 27 Socks10page
- 28 Kernels
- 29 SMB Relay
- 30 Awesomesauce technique
- 31 Automatic Domain Authentication
- 32 Service Manager
- 33 Compile Shell
- 34 Exploits