Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This video delves into Metasploit payloads. It examines the components of a payload that is used to perform an exploit:
- Modules - single or stagers (multiple).
- Stagers - "stage" a connection between the Kali host and the target.
- Stages - pieces of a payload downloaded by a stager. Used to build up a the connection.
Module 1 - Introduction & Kali Installation
Module 2 - Metasploit Fundamentals
Module 3 - Information Gathering
Module 4 - Vulnerability Scanning
Module 5 - Client Side Attacks
Module 6 - Post Exploitation
Part 1 - Explore Meterpreter
Part 2 - Screenshot
Part 3 - Privilege Escalation on Win7-32
Part 4 - Clearing Windows Event Logs
Part 5 - Using Incognito
Part 6 - Persistent Backdoor with NetCat
Part 7 - Remote Desktop Access with getgui
Part 8 - Sniffing the VICTIM's Packets
Part 9 - Port Forwarding
Part 10 - Changing File Attributes with Timestomp
Part 11 - Using the Search Function
Module 7 - Maintaining Access
Module 8 - Metasploit Extended Usage