تقييمات الطلاب
( 5 من 5 )
١ تقييمات
فيديو شرح Meterpreter commands in Kali Linux TryHackMe Metasploit: Meterpreter ضمن كورس اطار Metasploit شرح قناة Motasem Hamdan Cyber Security & Tech، الفديو رقم 7 مجانى معتمد اونلاين
In this video walk-through, we covered Meterpreter as a post-exploitation tool from Metasploit. This video covered most popular commands and their use. This was part of TryHackMe Junior Penetration Tester pathway.
#meterpreter
#metasploit
Receive Cyber Security Field Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
Challenge Questions and Answers
https://motasem-notes.net/meterpreter-commands-in-kali-linux-tryhackme-metasploit-meterpreter/
TryHackMe Metasploit: Meterpreter
https://tryhackme.com/room/meterpreter
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/mastermindstudynotes/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:00 - Introduction to Meterpreter
0:28 - Overview of Post-Exploitation with Meterpreter
1:30 - Starting the Exploit and Setting Parameters
3:29 - Interacting with Meterpreter Session
3:55 - Using Help Command to Explore Functions
5:03 - Gathering System Information with Sysinfo
6:04 - Listing Shares Created by the User
7:00 - Enumerating Shares Using Post-Exploitation Module
8:01 - Retrieving NTLM Hashes of a User
9:00 - Migrating to LSASS Process to Dump Hashes
10:50 - Cracking Hashes with John the Ripper
12:41 - Searching for Sensitive Files (secret.txt)
13:48 - Locating and Revealing the Content of Secrets File
14:45 - Locating the Real secret.txt File
15:33 - Revealing the Content of the Real Secret File
16:03 - Conclusion and Notes on Meterpreter Usage