Description:
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Vivek awesome tutorials.. million rupees worth..expecting wireshark,nessus,nmap tutorials from you..
Sure! I have a lot of stuff planned for this year. :)
Loved it man! Keep going! your the bestest ever!! On the side note, can you incorporate Windows 7, windows Vista? Just so we can get a feel for some of different exploits?
Vivek awesome bro, really helpful.
I have a question Vivek about the lab setup. How can one get an access to iso image of windows XP to run all these exploits in Virtual Box?
As they say, if not practiced, nothing is learnt..Are there any other ways that we can simulate these attacks..
Please advise..
Thanks
awesome like always realy thk
Vivek, thanks so much for the lesson and the insight. My colleague and I are hooked on your videos. Please keep it up!
Dude you rock.
Awesome videos.
Thank you
INCREDIBLE. I agree with the others let's see some more current exploits on Windows7. Also the use of nmap and nessus and some VOIP hacking as well. Would also be nice to show the db_autop0wn process and the database featureset of Metasploit. Other than that, EXCEPTIONAL JOB. VERY WELL EXPLAINED. Most tutorials you cant see the screen and the author doesnt explain what he/she is doing. This is not the case with your series. Keep up the great work
I agree w/ Johnny5- love the theoretical attacks and such w/ Windows XP (I'm using server03 when I follow along) but looking more at Windows 7 and how security changes affect all this would be nice to look into. DEP, ASLR, etc.
That said, that's my only criticism- absolutely fantastic videos. I've searched for exactly this level of quality on Youtube, etc and found nothing that even came close. Excellent work, Vivek!!
Excellent work, I am so thankful to have found your videos.
Thanks V, for another great Vid!
so, I was thinking regarding using Impersonate_token VS Steal_token... I don't known, but I would use Steal_token directly instead Impersonate_Token...
or there is any reason why should be must be used Impersonate_token rather than Steal_token??? at the end, both commands do same thing... is it right??? or just Im wrong???
thanks V!
superb.
Awesome video, thank you very much for this! You could prolly use a "Donate" button on this site somewhere. The content you put out is very valuable.
Hats off man...Your really awsum..these are the best metasploit videos i've seen till now..Just wanted to ask my friends and i have this query that how can you exploit a system which is out of our network? That means is another network..Soo if you can please post a video on that it would really be appreciated..thanxx
Very good! Thanks.
great ; thanks a lot
Another great vid!
Awesome Exellent Great Tutorials
Thanks vivekkkkkkkkkk :D
Another great megaprimer! Thanks for sharing all of this! o/
Vivek, thanks so much for sharing this information about Metasploit. I have watched this entire series and learned tons, and I'm currently making my way through the Wifi Megaprimer. Keep up the great work, and follow your inspiration wherever it may lead you :) It is much appreciated.
Another great Video! Thank you very much!
Thanks for the effort Vivek !!
Dear Vivek
is there a way to change the header in the outlook mail?
if yes please could you tell me how?
Thanks for all the comments guys! We have launched a SecurityTube Metasploit Framework Expert Certification today:
http://www.securitytube.net/smfe
The first 25 signups will receive discounted seats! Please hurry :)
into part 5 of metasploit mega primer, and I gotta tell ya this stuff is amazing.
from watching Prof. Vivek, to watching Standford and MIT Computer Engineering and Computer Science. getting alot of education. a hell of alot more than I did at any school.
Para conhecer o metasploit mais a fundo visite o fórum Amantes do Metasploit, lá você vai encontrar muito material em português
http://www.amantesdometasploit.com.br
Kia Ora, From New Zealand, Awesome, Thank you so much for your video's, I learn something every video, again Thank you!
AWESOME!!!!!
TOTALLY ROCKS!!! I study software engineer but not until I watched your video did I know how impersonation and delegation differ! Great explanations!!!
these videos are just brilliant - cannot thank you enough