Completed
▶️ Summary of what we have done
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Metasploit
Automatically move to the next video in the Classroom when playback concludes
- 1 ▶️ We like win
- 2 ▶️ I am administrator
- 3 ▶️ Linux access
- 4 ▶️ Password hashes
- 5 ▶️ Introduction
- 6 ▶️ Metasploit framework overview
- 7 ▶️ Why is this one of your favourite tools?
- 8 ▶️ Windows and Linux
- 9 ▶️ This is a local lab
- 10 ▶️ Windows Metasploit demo
- 11 ▶️ Eternal Blue overview
- 12 ▶️ Start eternalblue
- 13 ▶️ Check attack viability
- 14 ▶️ Specify target (RHOSTS)
- 15 ▶️ Exploit (check hosts)
- 16 ▶️ Gain access
- 17 ▶️ Reverse shell
- 18 ▶️ Set rhosts
- 19 ▶️ Set payload
- 20 ▶️ Set lhost
- 21 ▶️ Set lport
- 22 ▶️ Run exploit
- 23 ▶️ Win
- 24 ▶️ Shell access gained
- 25 ▶️ Full Admin access
- 26 ▶️ Summary of what was done
- 27 ▶️ This is much easier - use automation
- 28 ▶️ Why did this work?
- 29 ▶️ What about Linux?
- 30 ▶️ Linux demo example
- 31 ▶️ Linux shell bug
- 32 ▶️ Use option
- 33 ▶️ Set header
- 34 ▶️ Set rhosts
- 35 ▶️ Set targeturi
- 36 ▶️ Set lhost
- 37 ▶️ Exploit
- 38 ▶️ shell created
- 39 ▶️ Make pretty
- 40 ▶️ Use Linux commands
- 41 ▶️ Which user account is used
- 42 ▶️ Got a remote shell
- 43 ▶️ Escalate priv
- 44 ▶️ Get admin and root accounts
- 45 ▶️ Summary of what we have done
- 46 ▶️ What other tools are you going to show us