AXANO Posted January 13, 2016 Share Posted January 13, 2016 I've been seeking online for a complete tutorial that goes from finding if a computer is vulnerable to an exploitto getting a meterpreter session without the use of trojans.The things that are missing are... 1.the exact procedure of scanning a pc to find if it is vulnerable (and if it is possible a pc outside a local network and how is it possible to scan individual compuiters that are behind routers?) 2. Importing a new exploit that isnt already inside the metasploit framework. 3. setting a backdoor without the use of the persistance command of the meterpreter. 4. the procedure of the triggering of the exploit on the victim machine (what happens exactly?) any kind of info is apreciated. Quote Link to comment Share on other sites More sharing options...
digininja Posted January 13, 2016 Share Posted January 13, 2016 Have you looked through this? https://www.offensive-security.com/metasploit-unleashed/ Quote Link to comment Share on other sites More sharing options...
AXANO Posted January 14, 2016 Author Share Posted January 14, 2016 Yes but i dont want to register... thank you anyway I found this book through searching the page i hope it will answer my questions!!!http://www.it-docs.net/ddata/767.pdf Quote Link to comment Share on other sites More sharing options...
digininja Posted January 14, 2016 Share Posted January 14, 2016 What registration? I just viewed a handful of pages without registration. Quote Link to comment Share on other sites More sharing options...
AXANO Posted January 14, 2016 Author Share Posted January 14, 2016 for almost every online course you need to register before you advance e.x https://www.offensive-security.com/information-security-training/cracking-the-perimeter/ Quote Link to comment Share on other sites More sharing options...
digininja Posted January 14, 2016 Share Posted January 14, 2016 But I didn't point you at that course I pointed you at Metasploit Unleashed which is their free course for any one to use. Quote Link to comment Share on other sites More sharing options...
AXANO Posted January 14, 2016 Author Share Posted January 14, 2016 ok anyway thank you very much Quote Link to comment Share on other sites More sharing options...
vailixi Posted January 19, 2016 Share Posted January 19, 2016 (edited) You can always look on CVE-Details and Exploit-db for the latest exploits. Then you can look up a tutorial for each of them on YouTube. You can also start msfconsole and use search exploits And by using search you can modules in metasploit. So you find an example you want to try out something like exploit/windows/smb/ms08_067_netapi you can search for that exploit specifically.You can ad something to it like tutorial, youtube, or rapid7 you are bound to find a tutorial sooner than later. Also check outPackt Publishing and No Starch Press If you are looking for a book with a story to follow. Amazon. Edited January 19, 2016 by vailixi Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.