Description: This is Part 19A of the Security Metasploit Framework Expert (SMFE) course material. You can begin by watching Part 1 here: http://www.securitytube.net/video/2556 . Enjoy! Certifications page: http://www.securitytube.net/cert-list
In Part 19, we had demonstrated how to add a new DLL "mpr.dll" at either runtime or in advance to Railgun. In this video, we will quickly do the exact same demo on the Windows 7 Professional platform. This is just to demonstrate that even though a majority of the demonstrations were on Windows XP, the principles remain the same. Please watch Part 19 : http://www.securitytube.net/video/2722 before you use this video :)
As always, look forward to your comments.
Tags: smfe , railgun , mpr , add_dll , add_function , course , certification , metasploit ,
I need someone who is capable of hacking* websites & accessing their email database
I don't need scraping,web crawling or extractors
I need this sites HACKED so I gain access to their email DB
I will need to test the result u give me,if it checks out I shall send u 3000$ ASAP and 10-20 websites monthly,which will increase upon delivery of faster & quality service
Pls note,CONTINUITY is what I am after...I NEED A GOOD PARTNER I CAN WORK WITH FOR A VERY LONG TIME!. I HAVE AT LEAST 500 WEBSITES ON MY LIST AND IM WILLING TO PAY 3000$ PER WEBSITE
PLEASE SEND ME A MAIL IF U CAN DO THIS ASAP ; omorye007 (at) yahoo (dot) com
Cheers
@hacknix -- tough luck on that!
It's a knowledge sharers' hang out place. I doubt anyone here with a sane mind would want to involve themselves in criminal activities you're openly proposing. People ask questions and share thoughts on the subject matter here. You clearly landed in a wrong place. Try your luck somewhere else!
Dear vivek...
[sorry for my bad english]
I just practice to using metasploit with WAN connection.
I use msfpayload windows/meterpreter/reverse_tcp
after my backdoor created, then my victim machine execute that backdoor..
Before that..
my msfconsole is ready [im using exploit/multi/handler], I put my lhost, lport, payload.
but when I try exploit... I've got this error.
[-] Handler failed to bind [my public IP]
so, what that mean??
I hope you solve this.. :D
Handler failed to bind
The problem lies in windows/meterpreter/reverse_tcp
USe windows/meterpreter/bind_tcp
It will Work