Description: This is part 6 of a 6 part series showing you the method to the madness behind Armitage for Metasploit. This lecture shows you how to use the teaming features of Armitage to accomplish everything from the previous lectures. You'll learn how to use Armitage for real-time communication, data sharing, and session sharing. Finally, you'll also learn how to use external tools with Metasploit's pivoting ability. Complete series is at http://www.ethicalhacker.net/content/view/379/1/
Tags: armitage , metasploit , proxychains , pivoting , collaboration ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Very nice, thank you very much....
Great information and demonstration of red team workflow. I wanted to clap at the end of this video.
Nice series. btw Angelina's handle was AcidBurn
@Andrew I had all of my hackers references way wrong. For example, I used ZeroKill instead of ZeroCool. I probably spelled poor crash overrides name wrong.
awsome series :) thank you :)
Greate serials, learned a lot...
Thank you:)
thank u very much....i am putting these series on download..i'll watch these after i download them....i am an ethical hacking trainee....this will help me a lot....i'll mention ur name and the site owner's name in my project...i want to pusue a career in Pentesting...these videos will definitely help me and others as well...