How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole

NetSecNow 550 000 subscribers

http://www.PentesterUniversity.org In this Video we show you how to exploit machines with Metasploit, Armitage, and msfconsole. Thumbs up & Subscribe if you like it :-) Links: Links: Facebook: http://www.facebook.com/Netsecnow Blog: http://www.learnnetsec.com/ Twitter: http://www.twitter.com/LearnNetSec Metasploit Guide: http://www.offensive-security.com/metasploit-unleashed/Main_Page

100 Comments

  • This video was great very precised

    Reply
  • Dude, you are so awesome, uploading the videos! They are really great

    Reply
  • Will I study this in computer science degree?

    Reply
  • if i intend to play a little with lan should i connect directly to physical network

    Reply
  • I have a problem, I scan for attacks but an attack window doesn't pop up on my host, what should I do? Thanks for anyone that answers!

    Reply
  • If you reference a video then fkn link it in the description. No one has the time to watch those 50-minute long videos just to find the one you're talking about ffs

    Reply
  • sir ur teaching is very very very good

    Reply
  • is this information dated?

    Reply
  • you have one of the best channels

    Reply
  • my meterprter shell always closes in Armitage but not meteasploit any ideas why?

    Reply
  • i can't run the service of database can you help me? when i run the command sudo service postgresql start ,he told me postgresql.service not found

    Reply
  • I appreciate this video, I'm not familiar enough with Armitage, this cleared things up.

    Reply
  • Thank you for this Short tutorials... Appreciated and a very big help for me. Keep it up and make more!!! THANKS A LOT!

    Reply
  • thanks man you are great .first explanation should be skipped that's boring .

    Reply
  • Meant pc not product. Samsung autospell again

    Reply
  • Well OK Bought this product. The guy preloaded linux and tails for me on to vmware. I requested virtual box but looks like I'm stuck with vmware unless..there is a way to move the distros to thumb and then reload them. Guess I could redownload everything. Might just press on with vmware if it's not to different from virtualbox. Do you know which one is better btw?

    Reply
  • I just aquired K.linux and like this vid and think it is great but gave it a thumbs down only because this clearly us not a video for newbies. I guess it's a good video for the guy making this video who wants to flex his muscles and show off his hacker prowess, but other than that I have know Idea how to start doing what he's doing. I mean how am I supposed to perform these simulated attacks and to what safe mock simulated environment. I guess he very quickly maybe referenced those mock environments to be downliaded but I'm not sure.pkease forgive me for thumbs down. just pleae direct we what to go watch before this one.

    Reply
  • Thank you for a great video, you helped me. I really appreciate that!

    Reply
  • Great video bro

    Reply
  • Excellent video. Extraordinarily useful. Everything very well explained. Thank you very very much !!

    Reply
  • can you help my when i do the msf scans there comes a fail its: Auxiliary failed: Msf::OptionValidateError The following options failed to validate: RHOSTS.... help pls

    Reply
  • Thank You

    Reply
  • Is the same with Windows 7,8 and 10?

    Reply
  • Hey what is the proper playlist for watching these tutorials to get maximum out of it all?

    Reply
  • how to hack web cam

    Reply
  • where is the other video? any link is appreciated

    Reply
  • whats the root password or how can i figure it out

    Reply
  • What if the target is unreachable?

    Reply
  • that was one of the best penetration testing vedio I've ever seen

    Reply
  • when i right click it dosnt show attacks..how dose one fix this

    Reply
  • this video very helpful for my little brothers in west papua.. thanks for sharing knowledge for free..

    Reply
  • how to delete sms in victim's phone by Metasploit??

    Reply
  • can this technique be used on wan, or computers outside network?

    Reply
  • Can this work outside your local network?

    Reply
  • Net, mine does not work as it says "No targets were specified" and it does not let me get attack or anything. Almost like the computer does not exist, but I have checked the IP and everything.

    Reply
  • how can i get the Windows Xp with vulnerabilities same as your video?

    Reply
  • i like you video

    Reply
  • Hello, I was able to create the session but after i press enter like you did, it wont take me to meterpreter, im stuck on the page, any advice?

    Reply
  • For the people that are new, use the command search "module you want to search" instead of locate

    Reply
  • Intro music?

    Reply
  • Hey, i want to become an ethical hacker but i don't know from where i should get start,i have just completed 10th standard.Now i dont know what to do...i don't want to do studies anymore.i am very interested in learning programming languages and hacking also.Please suggest me what can i do now...

    Reply
  • Answer please

    Reply
  • Version of Kali Linux?

    Reply
  • You are an excellent teacher! I really hope you do a lot more videos!

    Reply
  • Hey Netsecnow, If you consider me then please add subtitles and provide links for Phase I and Phase II videos.

    Reply
  • HEllo Bro is device vulnerable only when the box have running server?

    Reply
  • Hello, I have a question! Can this all be done on local network(without internet)? Since I'm setting up the OS systems in my own computer's VM. Thanks.

    Reply
  • i love you man

    Reply
  • TARS 4 sharing - kind regards Michael. 🦄

    Reply
  • U guys need to check out( gamer chads) channel no joke

    Reply
  • why did you stopped making vids?

    Reply
  • watched 30 minutes so far. just in case you didn't/don't mention it, you can use Ctl+F on a tab, e.g. after filling a tab up with "check exploits" results, and search for "vulnerable" (looking for the string "the target is vulnerable" or "the target seems to be vulnerable"). cheers and thanks for the great vid.

    Reply
  • Does metaslpoit already come downloaded on the Kali Linux download?

    Reply
  • Is there a way to practice this without hacking into a real website/company? So a fake company/made up?

    Reply
  • When setting the LHOST is your real IP address exposed to tracing or is it cloaked someway?

    Reply
  • what exactly is the difference between the reverse and normal attack? I dont quite get it

    Reply
  • You should b getting paid for this dude, your EGGSIRLENT

    Reply
  • nce guide

    Reply
  • Is this only for your network? Pls anwser fast!

    Reply
  • Hello, what is an alternative way to get access to SSH if I know the username, however dictionary attack / brute force did not give me any luck. Tried Hydra, msf, armitage. Any backdoor or alternative exploit that you would know? Thank you!

    Reply
  • i don't have any attack option on one of the computers? i've tried googling it but i dont' come up with anything

    Reply
  • Can all of this be possible if you are not on the victims network? please help

    Reply
  • are you hacking into pcs on your network? I just wanna know how to get into pc and how to control it but with pc on another network

    Reply
  • Are you hacker?

    Reply
  • Can you somehow get the system password, like the login password? Btw nice vid

    Reply
  • exuseme sir. can i remoted many pc in the same time ? with armitage + metasploit ? plz answer

    Reply
  • hi, i tried to rebuilding infectedapk like as you. but, when i instal that, aplication get force close. i triedwith whatsapp and b612 but it's same get error force close. do you know why ? please help me. thanks

    Reply
  • الله يسامح ابوي لو تزوج أوروبية كان عرفت الانجليزي!!

    Reply
  • An easier way to penetrate servers online company

    Reply
  • Subscribed

    Reply
  • Hi, I really learnt a lot from those tutorial videos you posted! Seriously thinking about going to your online school for more advance lessons

    Reply
  • hello bro do you have some MetaSploit recommended courses ?

    Reply
  • Hi thanks for this. At 11:03 you mention "the last video" - which one are your referring to? Thank you.

    Reply
  • subscribed :)

    Reply
  • 48:37 msfconsole

    Reply
  • by far the best video iv seen I'm a noob but I learnt a good bit watching this once. must be good feeling known someone somewhere is gone mad cause you shut them down. was waiting for an angry face in the screen shot.

    Reply
  • guys windows 7 hack ? no backdoor pls

    Reply
  • Your video force me to subscribe your channel very great work. Love You. i need more support of you The Great Man

    Reply
  • hey can you give me an email where i can contact you .. thanks

    Reply
  • fresh-scan download link ?

    Reply
  • Hello guy could you help me how to remove winrar password use command window7 ? am hope that you help me to start my necessarily software and thank fisrt.

    Reply
  • i see alot of exploits on CVE details. but i dont see the exploits on exploitDB or anything where would i find and download the exploit to add to metasploit?

    Reply
  • I have a problem every time I scan any up it cannot find the os or any open ports I tried to use all the scans and it still don't work

    Reply
  • suscribed !!

    Reply
  • You have to excuse me I just noticed an interesting Defcon video. Be back.....

    Reply
  • Aren't we considered as script kiddies for using Metasploit?

    Reply
  • Thanks for getting me sent to Guantonomo Bay :) it was great cheers

    Reply
  • Superb video. Well explained. Very helpful for newbies.

    Reply
  • Pls do more videos I love them

    Reply
  • Why would you be launching Oracle and Samba exploits at a Windows machine? o.O

    Reply
  • good videos excellent explanation greetings from the middle east

    Reply
  • cool where i can download more scripts and stuffs for win7 coz i am trying to hack my own laptop on same network and i suck !

    Reply
  • DOS is used to attack alot of services some of the exploits become wormable once you get the CPU utilization over a certain percent the services do less cleaning task. and you can make custom exploits depending on how much space you have left when doing heap or stack attacks. it kills alot of the randomization that is protection is alot of current application and CPU protection methods

    Reply
  • Where is register link? i open kali linux and i need user name and password i cant find REGISTER :( please drop link

    Reply
  • anyone know of any recent tutorials? for windows 10? whenever i nmap -v an ip it says all ports are filtered. am i doing something wrong or do i just have to find an open port?

    Reply
  • Thank you!

    Reply
  • ПИДАРАС))))

    Reply
  • If it stops at Started reverse TCP handler does that mean it just didn't work? I was expecting some type of error message

    Reply
  • Really good video and very well explained. Greatings from Germany (:

    Reply
  • 2 More likes until this video has 1337 likes!!

    Reply

Add Comments