The Metasploit Framework: Its Database, Modules And Exploits

1 month ago
4

The metasploit framework has a huge database of vulnerabilities and allows us to automate the identification and exploitation of vulnerable services, and exfiltration of senstitive data from compromised systems. In this video we'll exploit some vulnerabilities against the Metasploitable 2 vulnerable machine, we'll also explore some of the other features offered by the framework.

How to hack a server?

Study with the best ethical hacking courses in the world: https://primeradsec-global.teachable.com

00:00 Intro
01:13 Network and IP address checks
02:44 Updating Metaploit
03:11 msfconsole and msfvenom
04:93 Short framework intro
06:20 First scan with db_nmap?
07:09 Initializing the metasploit database
07:50 db_nmap scan
08:50 Exploit modules: exploiting vsftpd 2.3.4 with Metasploit
11:10 Sessions
12:30 Automatic database population
12:40 A cyber-promotional message
14:28 Auxiliary modules: Identifying the VNC service password
16:30 Installing and using Remmina to log in VNC
18:11 Other vulnerable services and web applications in Metasploitable 2

Loading comments...