Description:
We introduced Scenario based Hacking in the
Metasploit Megaprimer Part 17. Please have a look there first before you begin this series, to understand the context.
In this first video of the
Scenario Based Hacking series, I will take up the simplest case - victim is not patches, has no AV or Firewall and the Attacker has direct IP layer access to the victim. This would be the case when both the Attacker and the Victim have public IP addresses or are part of the same LAN.
Please leave your comments behind and let me know which scenarios you would like me to demonstrate.
In the next video, we will take up the example where the Victim is behind a NAT! This is something a lot of you were asking me for! :)
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments:
i love your videos and your teaching style is amazing but your microphone lets the videos down. You have put so much effort into the video and slides its such a shame the audio is usually not great, i recommend a zoom h2 http://www.zoom.co.jp/english/products/h2/
this will give your videos a real profesional sound that matches the quality of the material !
keep up the good work.
dude your videos are awesome!!! u got me glued to the screen, keep up the gr8 work!! and thanks, i'm learning alot.
Great work sir.. u r educating a lot of people..
Awesome video.I have to agree with typeon3 on your style of teaching.It is just great and understandable.You Sir a a scholar!
Although there is one thing I don understand.
You are actually in the same LAN as I could see.But how can you exploit a box over the Internet? I managed to access my Laptop wich is located at my brothers house over the internet by creating an infected.exe including my External IP adress and my internal IP for the reverse connection.I have succesfuly spawned a Meterpreter Shell by executing the malicious file via Teamvierwer but I could not actually launch an Exploit.
The Error message was: Conection timed out.
Is it possible to exploit a remote box over the Internet using Exploits via Metasploit?
Would be interesting to see a video about that.
-Need new mic
-Great video
you are doing a great work your videos are excellent and your teaching style is really great
Thanks for all the comments guys! We have launched a SecurityTube Metasploit Framework Expert Certification today:
http://www.securitytube.net/smfe
The first 25 signups will receive discounted seats! Please hurry :)
Great work sir as always. I wanted to know how can we use metasploits exploits to exploit the victims which are not on the same lan, which are outside the organization over the internet. A video on that would be amazing.
Thnx for such a wonderful videos remain bless
thanks a lot Vivek !! you are the best !!