Metasploit
Daniel demonstrates how to gain access to a Windows and Linux server using metasploit. This is one of his favourite tools.
Big thanks to ITPro.TV for sponsoring this video.
In future videos, he will show us additional tools.
======
Menu:
======
Menu:
0:00 ▶️ We like win
0:25 ▶️ I am administrator
0:40 ▶️ Linux access
1:20 ▶️ Password hashes
1:35 ▶️ Introduction
1:50 ▶️ Metasploit framework overview
2:28 ▶️ Why is this one of your favourite tools?
4:05 ▶️ Windows and Linux
4:43 ▶️ This is a local lab
5:40 ▶️ Windows Metasploit demo
6:35 ▶️ Eternal Blue overview
7:24 ▶️ Start eternalblue
8:35 ▶️ Check attack viability
9:35 ▶️ Specify target (RHOSTS)
10:32 ▶️ Exploit (check hosts)
10:50 ▶️ Gain access
11:30 ▶️ Reverse shell
13:01 ▶️ Set rhosts
13:28 ▶️ Set payload
14:08 ▶️ Set lhost
14:30 ▶️ Set lport
14:53 ▶️ Run exploit
15:58 ▶️ Win
16:10 ▶️ Shell access gained
17:20 ▶️ Full Admin access
18:14 ▶️ Summary of what was done
18:49 ▶️ This is much easier - use automation
20:35 ▶️ Why did this work?
21:15 ▶️ What about Linux?
21:48 ▶️ Linux demo example
22:29 ▶️ Linux shell bug
23:50 ▶️ Use option
24:39 ▶️ Set header
25:06 ▶️ Set rhosts
25:35 ▶️ Set targeturi
26:17 ▶️ Set lhost
26:33 ▶️ Exploit
26:55 ▶️ shell created
27:07 ▶️ Make pretty
28:01 ▶️ Use Linux commands
28:27 ▶️ Which user account is used
28:51 ▶️ Got a remote shell
29:00 ▶️ Escalate priv
30:28 ▶️ Get admin and root accounts
30:49 ▶️ Summary of what we have done
33:03 ▶️ What other tools are you going to show us
========================
Download software and VMs:
========================
VM used: https://www.vulnhub.com/entry/bwapp-bee-box-v16,53/
Kali Linux: https://www.kali.org/downloads/
================
Links:
================
ITProTV Free Training: http://davidbombal.wiki/freeitprotv
My ITProTV affiliate link: http://davidbombal.wiki/itprotv
====================
Connect with Daniel:
====================
LinkedIn: https://www.linkedin.com/in/daniellowrie
Blog: https://blog.itpro.tv/author/daniellowrie
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from David Bombal · David Bombal · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
RYU SDN Controller Part 4: Graphical User Interface (GUI): Practical GNS3 SDN and OpenFlow
David Bombal
HPE Network Protector SDN Application Part 1 - Introduction
David Bombal
HPE Network Protector SDN Application Part 2 : DNS Interception using OpenFlow
David Bombal
HPE Network Protector SDN Application Part 3 - Lab Setup using Physical Switches
David Bombal
HPE Network Protector SDN Application Part 4 - Demo of malicious websites blocked
David Bombal
HPE Network Protector SDN Application Part 5 - Demo OpenFlow table interception flows
David Bombal
HPE Network Protector SDN Application Part 6 - Demo of Physical Switch configuration
David Bombal
HPE Network Protector SDN Application Part 7 - Demo Service Insertion Tunnel / GRE Tunnel
David Bombal
HPE Network Protector SDN Application Part 8 - Demo SDN OpenFlow Reporting
David Bombal
HPE Network Protector SDN Application Part 9 - Demo switches interception of DNS traffic
David Bombal
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
David Bombal
CCNA 200-125 Exam: AAA demo: TACACS+ with GNS3
David Bombal
GNS3 2.0.0 beta 2 install
David Bombal
CCNA #012: Learn SNMP with GNS3, Wireshark and Solarwinds NPM - CCNA 200-125 exam
David Bombal
CCNA #013: Spanning Tree CCNA Exam Questions: Know the answer? CCNA 200-125 exam
David Bombal
GNS3 2.0.0 beta : GNS3 VM integration with GNS3 GUI
David Bombal
CCNA #018: Routing exam questions: Who wins? OSPF, EIGRP or RIP? Sure? CCNA 200-125 exam
David Bombal
CCNA #019: Spanning Tree CCNA Exam Questions: Root Bridge, Root Port and more: CCNA 200-125 exam
David Bombal
GNS3 Download, installation and configuration - GNS3 1.5.3 and Windows 10
David Bombal
CCNA #023 EIGRP Neighbor Troubleshooting (DUAL Issues) for the CCNA 200-125 Exam
David Bombal
GNS3 2.0 Architecture and schema Part 1: What is the GNS3 Controller?
David Bombal
GNS3 2.0 Architecture and schema Part 2: Emulators and virtualization
David Bombal
CCNA #028 VTP Troubleshooting for the CCNA 200-125 Exam
David Bombal
CCNA #029 VTP & DTP Troubleshooting for the CCNA 200-125 Exam
David Bombal
CCNA #030 VTP Troubleshooting for the CCNA 200-125 Exam
David Bombal
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
David Bombal
GNS3 ASA setup: Import and configure Cisco ASAv with GNS3
David Bombal
GNS3 switching setup and options: Cisco and other switching options in GNS3
David Bombal
GNS3 switching setup and options Part 2: GNS3 unmanaged built-in switch
David Bombal
GNS3 switching setup and options Part 3: Router on a sick with GNS3 unmanaged built-in switch
David Bombal
GNS3 switching setup and options Part 4: Etherswitch Router for Cisco Dynamips Part 1
David Bombal
GNS3 switching setup and options Part 5: Etherswitch Router for Cisco Dynamips Part 2
David Bombal
GNS3 switching setup and options Part 6: Etherswitch, Wireshark, 802.1Q, InterVLAN routing
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 1: GNS3 Switching Part 7
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 2: GNS3 Switching Part 8
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 3: GNS3 Switching Part 9
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 4: GNS3 Switching Part 10
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 5: GNS3 Switching Part 11
David Bombal
GNS3 Nexus (NX-OSv) switch setup and configuration Part 1: GNS3 switching options Part 12
David Bombal
GNS3 Nexus (NX-OSv) switch setup and configuration Part 2: GNS3 switching options Part 13
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 6: GNS3 Switching Part 14
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 7: GNS3 Switching Part 15
David Bombal
GNS3 Cisco CSR 1000v setup and configuration Part 1: GNS3 NFV
David Bombal
GNS3 Cisco CSR 1000v setup and configuration Part 2: GNS3 NFV
David Bombal
GNS3 Talks: Use the NAT node to connect GNS3 to the Internet easily!
David Bombal
GNS3 Talks: GNS3 2.0 RC1 is now available
David Bombal
GNS3 Talks: GNS3 2.0 Portable Projects - easily export and import GNS3 projects
David Bombal
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
David Bombal
CCNA #035 NAT Troubleshooting Scenario 1 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
CCNA #036 NAT Troubleshooting Scenario 2 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
GNS3 Talks: ESXi, GNS3 VM and KVM support Part 1: leverage servers and the cloud
David Bombal
CCNA #037 OSPF Troubleshooting - can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
GNS3 Talks: ESXi, GNS3 VM and KVM support Part 2: leverage servers and the cloud
David Bombal
CCNA #038 NAT Troubleshooting Scenario 3 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
CCNA #039 - OSPF DR, BR and DROTHER Election - do you know the answers?
David Bombal
CCNA #040 NAT Troubleshooting Scenario 4 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
GNS3 Talks: Arista vEOS GNS3 import and configuration Part 1
David Bombal
CCNA #041 - OSPF DR, BR and DROTHER Election - do you know the answers?
David Bombal
GNS3 Talks: Arista vEOS GNS3 import and configuration Part 2
David Bombal
GNS3 Talks: ipterm: Linux, Docker, Python, SDN and more! Part 1
David Bombal
Related AI Lessons
⚡
⚡
⚡
⚡
Virtual Keyboard Login with PingOne Advanced Identity Cloud
Medium · Cybersecurity
Why Businesses Quietly Accept Technology Friction as “Normal”
Medium · Cybersecurity
The Model You Just Downloaded Might Own Your Network — What I Learned Building Defenses Against AI…
Medium · Cybersecurity
I Found Backdoored AI Models on Hugging Face — And So Has Everyone Else Who Bothered to Look
Medium · Cybersecurity
Chapters (46)
We like win
0:25
I am administrator
0:40
Linux access
1:20
Password hashes
1:35
Introduction
1:50
Metasploit framework overview
2:28
Why is this one of your favourite tools?
4:05
Windows and Linux
4:43
This is a local lab
5:40
Windows Metasploit demo
6:35
Eternal Blue overview
7:24
Start eternalblue
8:35
Check attack viability
9:35
Specify target (RHOSTS)
10:32
Exploit (check hosts)
10:50
Gain access
11:30
Reverse shell
13:01
Set rhosts
13:28
Set payload
14:08
Set lhost
14:30
Set lport
14:53
Run exploit
15:58
Win
16:10
Shell access gained
17:20
Full Admin access
18:14
Summary of what was done
18:49
This is much easier - use automation
20:35
Why did this work?
21:15
What about Linux?
21:48
Linux demo example
22:29
Linux shell bug
23:50
Use option
24:39
Set header
25:06
Set rhosts
25:35
Set targeturi
26:17
Set lhost
26:33
Exploit
26:55
shell created
27:07
Make pretty
28:01
Use Linux commands
28:27
Which user account is used
28:51
Got a remote shell
29:00
Escalate priv
30:28
Get admin and root accounts
30:49
Summary of what we have done
33:03
What other tools are you going to show us
🎓
Tutor Explanation
DeepCamp AI