nulbyte.blogspot.com presents, “Owning with Nessus and Metasploit.” I’m going to show you how to use Nessus to scan a target and then import the .nbe file into Metasploit’s db_autopwn. I use Backtrack 4 Beta as my attacking OS and Windows XP SP2 as my victim OS I end the video with a Meterpreter session, but you could easily upload Netcat and open a backdoor to get access again. If you really like Meterpreter, like I do, you can check out my other video where I tell you how to make it into an executable file and use it as a backdoor (I use it in conjunction with Netcat). If you like my videos, you can check out my blog or you can email me at nulbytesecurity [[email protected]] gmail.com. More HD hacking videos coming soon! Legal Please only do this on your local network for educational purposes and I’m not responsible for anything you do with this knowledge.
Subscribe to our NewsletterLoading...
Tag CloudAnti Virus Protection Backtrack Blackhat Blog Botnet Cisco Cloud Security Cracking Cyber Security cyber security conference Data Security Educational Purposes Exploit Free Anti Virus Google Hack Hacking Hard Drive Recovery Honey Pot Honeypot Internet Security Lessons Learned Linux Mainstream Malware Management Tools Metasploit Mitm Network Security Nmap Passwords Penetration Penetration Testing Remote Exploit Security Test Speakers Ssl Steganography Symantec Testing Tool Voip Testing Vulnerabilities Wireshark Zero Day Zeus