ITpro - Metasploit
English | mp4 | H264 1280x720 | AAC 2 ch | 11 hrs 58 min | 4.58 GB
These episodes walk you through using Metasploit, the popular penetration testing software. Whether using Windows or Linux, Metasploit can be a powerfull tool to test network security. Learn how to use Metasploit as a part of your security toolkit.
Contents:
01 Metasploit Overview (4m).mp4
02 What is Metasploit (26m).mp4
03 Versions of Metasploit (24m).mp4
04 Metasploit Basics (28m).mp4
05 Exploring the Interface (27m).mp4
06 Exploring the Utilities (15m).mp4
07 Passive Intelligence Gathering (26m).mp4
08 Active Intelligence Gathering (27m).mp4
09 Active Intelligence Gathering Part 2 (25m).mp4
10 Using A Vulnerability Scan (25m).mp4
11 Doing A Vulnerability Scan (29m).mp4
12 Vulnerability Scanners (32m).mp4
13 Vulnerability Scanners Part 2 (23m).mp4
14 Exploits - A Closer Look (20m).mp4
15 Exploits (27m).mp4
16 Exploiting Services (24m).mp4
17 What is Meterpreter (23m).mp4
18 Launching the Meterpreter (26m).mp4
19 Using the Meterpreter (25m).mp4
20 Using the Meterpreter Part 2 (27m).mp4
21 Advanced Meterpreter (15m).mp4
22 Social Engineering (16m).mp4
23 SET Integration (20m).mp4
24 What is Armitage (23m).mp4
25 Configuring Armitage (26m).mp4
26 Armitage Exploits (21m).mp4
27 Armitage Exploits Part 2 (27m).mp4
28 After the Exploit (21m).mp4
29 After the Exploit Part 2 (21m).mp4
30 Pivoting (18m).mp4
31 Advanced Metasploit (25m).mp4