Description: This is part 5 of a 6 part series showing you the method to the madness behind Armitage for Metasploit. The last step is to take your access and turn it into more access. This lecture shows how to use Metasploit's pivoting to get at otherwise unreachable hosts, scan through a pivot, dump hashes, and abuse a Windows Active Directory domain. Complete series is at
http://www.ethicalhacker.net/content/view/379/1/
Tags: armitage , metasploit , pass the hash , hashdump , pivoting ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thank you very much.. Learned much from it..