Learn how metasploit can be used to access a Windows system, and access Windows XP and Windows 7.
- [Voiceover] Let's have a look at how an adversary…would exploit a Windows system using…a malicious attachment to an email,…or a trojan, that's downloaded from the web.…We'll use a tool called 'M-S-F venom'…to create a malicious payload.…All the payload will do is to call back…and offer a shell on the target system.…We can create the trojan, by telling M-S-F venom…that we want to create a reverse T-C-P shell…on a Windows X86 system.…The trojan should be in E-X-E form…and call back to our Kali system on…ten dot naught dot two dot 22…using port four four four four.…
We'll call the malicious trojan, winjan dot E-X-E.…That's it, the trojan's been created.…We need to next set up our server…to listen for this trojan calling back.…We can do that by starting Metasploit…as a call back handler.…
Okay, all we have to do now,…is get our target to execute the payload.…I have the malicious attachment…loaded onto my Windows seven system, and I can execute it.…Okay, nothing happens, but we've been exploited.…We've exploited our targets and have…
This course will give prospective ethical hackers a short overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation.
Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills.
- Overview of Metaploit, Maltego, and Wifite
- Setting up a virtual lab with Oracle VM
- Installing virtual machines and appliances
- Exploring the Kali Linux applications
- Gathering information with DMitry and DNSenum
- Conducting a vulnerability assessment
- Installing OpenVAS and Vega
- Testing passwords
- Exploiting targets
Skill Level Beginner
Q: This course was updated on 06/12/2017. What changed?
A: The following topics were updated: setting up a virtual lab, installing appliances, Windows Credential Editor, using John for Windows passwords, pass the hash, using rainbow tables, exploiting with Armitage, pivoting through a network, and getting stealth and persistent access. In addition, a new video was added that shows how to create Trojans with msfvenom.
1. Setting Up the Virtual Lab
Installing virtual machines8m 11s
2. Introducing Kali
3. Information Gathering (Understanding the Target)
4. Vulnerability Analysis
5. Passwords and Hashes
6. Exploiting Targets
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.