2014
5:46 hours
SECTION 1 WELCOME TO THE METASPLOIT SERIES
SECTION 2 RUSHING TO METASPLOIT
SECTION 3 INTRODUCTION TO METASPLOIT IN KALI LINUX
SECTION 4 CLEARING THE FUNDAMENTALS
SECTION 5 INFORMATION GATHERING VIA METASPLOIT
SECTION 6 VULNERABILITY SCANNING VIA METASPLOI
SECTION 7 EXPLOIT-PAYLOAD CREATION
SECTION 8 CLIENT SIDE ATTACKS
SECTION 9 AFTER EXPLOITATION STUFF
SECTION 10 SCRIPTS,METERPRETER AND RUBY EXTENSION
SECTION 11 BACKDOORING THE REMOTE SYSTEM
SECTION 12 REAL WORLD EXPLOITATION
SECTION 13 OUTRO OF THE SERIES
./SECTION 1 WELCOME TO THE METASPLOIT SERIES:
Lecture 1 – Intro to the Series.MP4
Lecture 2 – About the Instructor ( That’s me ).MP4
Lecture 3 – How to take most out of the series!.MP4
./SECTION 2 RUSHING TO METASPLOIT:
Lecture 4 – What is Pentesting and why.MP4
Lecture 5 – Hats Off to HD.MP4
Lecture 6 – Terminologies and requirement of Metasploit.MP4
Lecture 7 – Kali Linux Installation.MP4
Lecture 8 – Installation of Pratice Lab.MP4
Lecture 9 – Getting Hurry with practicles.MP4
./SECTION 3 INTRODUCTION TO METASPLOIT IN KALI LINUX:
Lecture 10 – Metasploit Architecture.MP4
Lecture 11 – Mixins and Plugins with a touch to Ruby.MP4
./SECTION 4 CLEARING THE FUNDAMENTALS:
Lecture 12 – MsfCLI.MP4
Lecture 13 – Msfconsole.MP4
Lecture 14 – Exploits in Metasploit.MP4
Lecture 15 – Important commands for exploits usage.MP4
Lecture 16 – Payload Basics.MP4
Lecture 17 – Generating different Payloads.MP4
Lecture 18 – Database in Metasploit.MP4
Lecture 19 – Meterpreter in Metasploit.MP4
Lecture 20 – Meterpreter usage in metasploit.MP4
./SECTION 5 INFORMATION GATHERING VIA METASPLOIT:
Lecture 21 – Port Scanning with Metasploit.MP4
Lecture 22 – target mssql.MP4
Lecture 23 – Service information via metasploit.MP4
Lecture 24 – SNMP sniffing.MP4
Lecture 25 – psnuffel script in metasploit.MP4
Lecture 26 – custom scanner by user.MP4
./SECTION 6 VULNERABILITY SCANNING VIA METASPLOI:
Lecture 27 – SMB Login Check Scanner.MP4
Lecture 28 – open VNC server scanning.MP4
Lecture 29 – WMAP web scanner in metasploit.MP4
Lecture 30 – NeXpose scanner via metasploit.MP4
Lecture 31 – nessus usage and metasploit.MP4
./SECTION 7 EXPLOIT-PAYLOAD CREATION:
Lecture 32 – Design Goals for an Exploit.MP4
Lecture 33 – mixins in exploit writing.MP4
Lecture 34 – Msfvenom.MP4
Lecture 35 – Msfpayload.MP4
Lecture 36 – Msfencode.MP4
Lecture 37 – AN Shellcode.MP4
./SECTION 8 CLIENT SIDE ATTACKS:
Lecture 38 – Binary Payloads.MP4
Lecture 39 – Trojans for linux via Metasploit.MP4
Lecture 40 – malicious PDF file via Metasploit.MP4
./SECTION 9 AFTER EXPLOITATION STUFF:
Lecture 41 – Privilege Escalation.MP4
Lecture 42 – pass the hash attack.MP4
Lecture 43 – Session stealing attacks.MP4
Lecture 44 – Registry and backdoors in metsploit.MP4
Lecture 45 – packet sniffing with metasploit.MP4
Lecture 46 – Bypassing the forensic investigation.MP4
Lecture 47 – monitoring and searching the victim.MP4
./SECTION 10 SCRIPTS,METERPRETER AND RUBY EXTENSION:
Lecture 48 – Ready to use meterpreter scripts.MP4
Lecture 49 – automation of meterpreter via rc scripts.MP4
Lecture 50 – irb shell programming in meterpreter.MP4
./SECTION 11 BACKDOORING THE REMOTE SYSTEM:
Lecture 51 – keylogging the remote system.MP4
Lecture 52 – metsvc exploitation.MP4
Lecture 53 – persistence exploitation services.MP4
./SECTION 12 REAL WORLD EXPLOITATION:
Lecture 54 – Karmetasploit Breaking into a external system with windows 7.MP4
./SECTION 13 OUTRO OF THE SERIES:
Lecture 55 – Outro video.MP4