Completed
▶️ We like win
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Metasploit
Automatically move to the next video in the Classroom when playback concludes
- 1 ▶️ We like win
- 2 ▶️ I am administrator
- 3 ▶️ Linux access
- 4 ▶️ Password hashes
- 5 ▶️ Introduction
- 6 ▶️ Metasploit framework overview
- 7 ▶️ Why is this one of your favourite tools?
- 8 ▶️ Windows and Linux
- 9 ▶️ This is a local lab
- 10 ▶️ Windows Metasploit demo
- 11 ▶️ Eternal Blue overview
- 12 ▶️ Start eternalblue
- 13 ▶️ Check attack viability
- 14 ▶️ Specify target (RHOSTS)
- 15 ▶️ Exploit (check hosts)
- 16 ▶️ Gain access
- 17 ▶️ Reverse shell
- 18 ▶️ Set rhosts
- 19 ▶️ Set payload
- 20 ▶️ Set lhost
- 21 ▶️ Set lport
- 22 ▶️ Run exploit
- 23 ▶️ Win
- 24 ▶️ Shell access gained
- 25 ▶️ Full Admin access
- 26 ▶️ Summary of what was done
- 27 ▶️ This is much easier - use automation
- 28 ▶️ Why did this work?
- 29 ▶️ What about Linux?
- 30 ▶️ Linux demo example
- 31 ▶️ Linux shell bug
- 32 ▶️ Use option
- 33 ▶️ Set header
- 34 ▶️ Set rhosts
- 35 ▶️ Set targeturi
- 36 ▶️ Set lhost
- 37 ▶️ Exploit
- 38 ▶️ shell created
- 39 ▶️ Make pretty
- 40 ▶️ Use Linux commands
- 41 ▶️ Which user account is used
- 42 ▶️ Got a remote shell
- 43 ▶️ Escalate priv
- 44 ▶️ Get admin and root accounts
- 45 ▶️ Summary of what we have done
- 46 ▶️ What other tools are you going to show us