Description: This is part 4 of a 6 part series showing you the method to the madness behind Armitage for Metasploit. This lecture teaches what to do after you break into a host. You'll learn how to interact with a host, browse files, steal keystrokes, kill programs, and use Metasploit's powerful post-exploitation modules. Armitage's logging features are covered as well. Complete series is at
http://www.ethicalhacker.net/content/view/379/1/
Tags: armitage , meterpreter , metasploit , post-exploitation ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thank you very much..