Completed
Learn Kali Linux Episode #70: Creating a Persistent Reverse Shell with Metasploit
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Complete Kali Linux Course - Beginner to Advanced
Automatically move to the next video in the Classroom when playback concludes
- 1 Learn Kali Linux Episode #1: Introduction
- 2 Learn Kali Linux Episode #2: Course Prerequisites
- 3 Learn Kali Linux Episode #3: Basic Terminology
- 4 Learn Kali Linux Episode #4: Basic Terminology (Continued)
- 5 Learn Kali Linux Episode #5: Installing VirtualBox with RPM
- 6 Learn Kali Linux Episode #6: VirtualBox Installation Using the Linux Package Manager
- 7 Learn Kali Linux Episode #7: Virtual Machine Configuration
- 8 Learn Kali Linux Episode #8: Installing VirtualBox on Windows
- 9 Learn Kali Linux Episode #9: Kali Linux Installation
- 10 Learn Kali Linux Episode #10: Starting Kali Linux, Configuring the Network, and Updating Software
- 11 Learn Kali Linux Episode #11: Installing VirtualBox Guest Additions
- 12 Learn Kali Linux Episode #12: Introduction to the Terminal
- 13 Learn Kali Linux Episode #13: Command Line Essentials (Part 1)
- 14 Learn Kali Linux Episode #14: Command Line Essentials (Part 2)
- 15 Learn Kali Linux Episode #15: Accessing the Dark Web Using the Tor Browser (Part 1)
- 16 Learn Kali Linux Episode #16: Accessing the Dark Web Using the Tor Browser (Part 2)
- 17 Learn Kali Linux Episode #17: Staying Anonymous with ProxyChains (Part 1)
- 18 Learn Kali Linux Episode #18: Staying Anonymous with ProxyChains (Part 2)
- 19 Learn Kali Linux Episode #19: Staying Anonymous with ProxyChains (Part 3)
- 20 Learn Kali Linux Episode #20: Virtual Private Network (VPN) Setup (Part 1)
- 21 Learn Kali Linux Episode #21: Virtual Private Network (VPN) Setup (Part 2)
- 22 Learn Kali Linux Episode #22: Macchanger (Part 1)
- 23 Learn Kali Linux Episode #23: Macchanger (Part 2)
- 24 Learn Kali Linux Episode #24: Footprinting with Nmap (Part 1)
- 25 Learn Kali Linux Episode #25: Footprinting with Nmap (Part 2)
- 26 Learn Kali Linux Episode #26: External Nmap Resources
- 27 Learn Kali Linux Episode #27: Introduction to WiFi Cracking
- 28 Learn Kali Linux Episode #28: Aircrack and Reaver Installation
- 29 Learn Kali Linux Episode #29: Aircrack-ng and Crunch Setup
- 30 Learn Kali Linux Episode #30: Aircrack-ng and Crunch Usage Example (Part 1)
- 31 Learn Kali Linux Episode #31: Aircrack-ng and Crunch Usage Example (Part 2)
- 32 Learn Kali Linux Episode #32: Aircrack-ng and Crunch Usage Example (Part 3)
- 33 Learn Kali Linux Episode #33: Brute-Forcing WPS Pins with Reaver (Part 1)
- 34 Learn Kali Linux Episode #34: Brute-Forcing WPS Pins with Reaver (Part 2)
- 35 Learn Kali Linux Episode #35: Brute-Forcing WPS Pins with Reaver (Part 3)
- 36 Learn Kali Linux Episode #36: Signal Jamming and Denial of Service Demonstration (Part 1)
- 37 Learn Kali Linux Episode #37: Signal Jamming and Denial of Service Demonstration (Part 2)
- 38 Learn Kali Linux Episode #38: SSL Stripping and ARP Spoofing (Part 1)
- 39 Learn Kali Linux Episode #39: SSL Stripping and ARP Spoofing (Part 2)
- 40 Learn Kali Linux Episode #40: SSL Stripping and ARP Spoofing (Part 3)
- 41 Learn Kali Linux Episode #41: Funny Things (Part 1)
- 42 Learn Kali Linux Episode #42: Funny Things (Part 2)
- 43 Learn Kali Linux Episode #43: Funny Things (Part 3)
- 44 Learn Kali Linux Episode #44: Evil Twin (Part 1)
- 45 Learn Kali Linux Episode #45: Evil Twin (Part 2)
- 46 Learn Kali Linux Episode #46: Evil Twin (Part 3)
- 47 Learn Kali Linux Episode #47: Router Vulnerabilities (Part 1)
- 48 Learn Kali Linux Episode #48: Router Vulnerabilities (Part 2)
- 49 Learn Kali Linux Episode #49: Router Vulnerabilities (Part 3)
- 50 Learn Kali Linux Episode #50: Introduction to Social Engineering
- 51 Learn Kali Linux Episode #51: Website Cloning Using SEToolkit
- 52 Learn Kali Linux Episode #52: Social Engineering Demonstration
- 53 Learn Kali Linux Episode #53: Introduction to SQL Injections
- 54 Learn Kali Linux Episode #54: MySQL Database Setup
- 55 Learn Kali Linux Episode #55: Burp Suite Basics
- 56 Learn Kali Linux Episode #56: Sqlmap Demonstration (Part 1)
- 57 Learn Kali Linux Episode #57: Sqlmap Demonstration (Part 2)
- 58 Learn Kali Linux Episode #58: Introduction to Cracking Hashes
- 59 Learn Kali Linux Episode #59: Cracking Linux Passwords with John the Ripper (Part 1)
- 60 Learn Kali Linux Episode #60: Cracking Linux Passwords with John the Ripper (Part 2)
- 61 Learn Kali Linux Episode #61: Cracking Windows Passwords with John the Ripper
- 62 Learn Kali Linux Episode #62: Introduction to Hydra
- 63 Learn Kali Linux Episode #63: Complete Hydra Demonstration
- 64 Learn Kali Linux Episode #64: Denial of Service (DoS) Demo (Part 1)
- 65 Learn Kali Linux Episode #65: Denial of Service (DoS) Demo (Part 2)
- 66 Learn Kali Linux Episode #66: Denial of Service (DoS) Demo (Part 3)
- 67 Learn Kali Linux Episode #67: Intro to Metasploit and Reverse Shells
- 68 Learn Kali Linux Episode #68: Deploying a Payload with Metasploit
- 69 Learn Kali Linux Episode #69: Escalating Privileges on Another System
- 70 Learn Kali Linux Episode #70: Creating a Persistent Reverse Shell with Metasploit
- 71 Learn Kali Linux Episode #71: Creating Reverse Shells with Netcat
- 72 Learn Kali Linux Episode #72: Uploading a Reverse Shell to a Web Server