In-Depth Look at the Metasploit Framework and Pass-the-Hash

Описание к видео In-Depth Look at the Metasploit Framework and Pass-the-Hash

An in-depth look at the Metasploit Framework: using the database, scanning, and using exploitation/post-exploitation modules. Includes how to perform pass-the-hash attacks using both Metasploit and the built-in Kali pass-the-hash tools

Intro: (00:00)
Bind shells and reverse shells: (00:22)
Starting Metasploit: (04:30)
Getting help: (06:11)
Scanning and the Metasploit database: (07:52)
How hashes work: (20:15)
Metasploit modules: (22:40)
Session management (36:08)
Meterpreter: (40:06)
Pass-the-hash attack explanation: (40:56)
Dumping hashes: (41:36)
Pass-the-hash using Metasploit: (44:10)
Pass-the-hash with other Kali tools: (50:07)
Outro: (53:30)

Basic networking concepts:    • Learn How to Hack: Introduction and Demo   (1:44-9:47)
Information gathering and scanning:    • Learn How to Hack: Information Gathering  

Hosted by CyberHawks cybersecurity club at the Illinois Institute of Technology
Presented by John Ford

If you're interested in receiving general computer science or cybersecurity resources, please reach out to me via email at [email protected] or message me at (224) 223-0814. If you'd prefer resources specific to your level of knowledge and topic of study, I'd be glad to provide you with those as well for a $5 consultation fee.

I also offer one-on-one tutoring in mathematics and computer science related topics and typically charge $25 per hour. I am willing to tutor remotely over Skype or Zoom.

Computer science topics I have experience with: cybersecurity, network management, sockets and network communication, artificial intelligence (in Python), web development, GDB debugging, data structures

Languages I work with regularly: C, C#, C++, Java, Python, Lua, MatLab, HTML, CSS, JavaScript, SQL, PHP, VHDL, Intel x86 Assembly

Комментарии

Информация по комментариям в разработке