Podcasts about metasploit framework

  • 9PODCASTS
  • 15EPISODES
  • 1h 7mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 3, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about metasploit framework

Latest podcast episodes about metasploit framework

InfosecTrain
What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

InfosecTrain

Play Episode Listen Later Apr 3, 2023 96:27


InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching this video, For more details or free demo with our expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar

InfosecTrain
What is Metasploit Framework? | Metasploit For Beginners | InfosecTrain

InfosecTrain

Play Episode Listen Later Mar 3, 2023 61:21


The Metasploit Framework includes a range of tools and features for conducting automated and manual penetration testing, such as vulnerability scanning, exploit development, payload creation, and post-exploitation modules. It provides a large library of pre-built exploits, payloads, and modules that can be used to test different types of vulnerabilities in target systems. #metasploitframework #metasploit #metasploittutorial #ethicalhacking #msfconsole #penetrationtesting #metasploitforbeginners #metasploitproject #cybersecurity #infosectrain #ethicalhackers Thank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar

beginners metasploit framework
InfosecTrain
RedTeam : What is Metasploit Framework | Day 2: RedTeam | InfosecTrain

InfosecTrain

Play Episode Listen Later May 31, 2022 67:15


✅Agenda of the Session ✔️Looking Into Metasploit Framework ✔️Challenge solving ✔️Using Metasploit Framework For exploiting

red team metasploit framework
Hack Chat
HD Moore // The Journey of a Hacker and Entrepreneur

Hack Chat

Play Episode Listen Later Feb 11, 2021 43:00


In this episode of Hack Chat, we discuss what it takes to become good at hacking, and delve into his newest business venture—Rumble.H. D. Moore is a network security expert, open source programmer, and hacker. He is a developer of the Metasploit Framework, the world’s most used penetration testing software suite, and the founder of the Metasploit Project. He has been referred to as “the industry’s most famous white hat hacker,” as well as an overall good dude.#HACKCHAT #infosec #ethicalhacking #cybersecurity #redteam #blueteam

DEF CON 23 [Audio] Speeches from the Hacker Convention
Joshua Smith - High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 21, 2015


Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC Joshua Smith Senior Security Researcher, HP Zero Day Initiative The HDMI (High Definition Multimedia Interface) standard has gained extensive market penetration. Nearly every piece of modern home theater equipment has HDMI support and most modern mobile devices actually have HDMI-capable outputs, though it may not be obvious. Lurking inside most modern HDMI-compatible devices is something called HDMI-CEC, or Consumer Electronics Control. This is the functionality that allows a media device to, for example, turn on your TV and change the TV’s input. That doesn’t sound interesting, but as we'll see in this presentation, there are some very surprising things an attacker can do by exploiting CEC software implementations. Then there's something called HEC or HDMI Ethernet Connection, which allows devices to establish an Ethernet connection of up to 100Mbit/s over their HDMI connections (newer HDMI standards raise the speed to 1Gbit/s). Don't think your mobile phone implements CEC? You might be wrong. Most modern Android-based phones and tablets have a Slimport(r) connection that supports HDMI-CEC. Ever heard of MHL (Mobile High-Definition Link)? Think Samsung and HTC (among other) mobile devices, and many JVC, Kenwood, Panasonic, and Sony car stereos – as many as 750 million devices in the world so far. Guess what? MHL supports HDMI-CEC as well. Let's explore, and own, this attack space. Kernelsmith is senior vulnerability researcher with Hewlett-Packard Security Research (HPSR). In this role, he analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the Zero-Day Initiative (ZDI) program, which represents the world’s largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world. Joshua is also a developer for the Metasploit Framework and has spoken at a few conferences and holds a few certifications. Prior to joining HP, Smith served in the U.S. Air Force in various roles including as an Intercontinental Ballistic Missile (ICBM) Crew Commander and Instructor, but more relevantly as a penetration tester for the 92d Information Warfare Aggressor Squadron. Post-military, he became a security engineer at the John Hopkins University Applied Physics Lab, where he began contributing to the Metasploit Framework. Smith performed research into weapons systems vulnerabilities as well as evasion and obfuscation techniques to add depth and realism to security device tests. Smith received a B.S. in Aeronautical Engineering from Rensselaer Polytechnic Institute and an M.A. in Management of Information Systems from the University of Great Falls. Smith was drawn to ZDI for the chance to work with a world-wide network of security researchers while continuing his own vulnerability research. When not researching software vulnerabilities, Josh enjoys raising his two young hackers-to-be and watching sci-fi since he can't play sports anymore (there's no tread left on his knees). Twitter: @kernelsmith, @thezdi

SecuraBit
SecuraBit Episode 45 – More on DOJOCON

SecuraBit

Play Episode Listen Later Nov 24, 2009 54:50


SecuraBit Episode 45 – More on DOJOCON Marcus J Carey discusses MetaSponse tool to be released in mid-December. This uses the MetaSploit Framework for Incident Response. Metasploit Framework 3.3  Released! http://blog.metasploit.com/2009/11/metasploit-framework-33-released.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+metasploit%2Fblog+%28Metasploit+Blog%29 Join us in IRC at irc.freenode.net #securabit Hosts: Anthony Gartner – @anthonygartner Chris Gerling  – @chrisgerling Christopher Mills – @thechrisam Jason Mueller - @securabit_jay Andrew Borel – @andrew_secbit Guest: Marcus Carey – @marcusjcarey Links: DojoCon - http://www.dojocon.org/ Hackers for Charity - http://www.hackersforcharity.org/ hak5 - http://www.hak5.org/ NoVA Hackers - http://groups.google.com/group/novahackers dojosec @ USTREAM http://www.ustream.tv/dojosec White Wolf Security - http://www.whitewolfsecurity.com/ ShmooCon 2010 - http://www.shmoocon.org/ Netwars Competition - http://www.sans.org/netwars/ International Spy Museum - http://www.spymuseum.org/ Cyber Forensics: Digital CSI - http://spymuseum.org/programs/calendar_pages/2009/q4/2009_12_01_prog.php http://hashtags.org/tag/roachesmustdie

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.

Penetration testing often focuses on individual vulnerabilities and services. This talk introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using combination of new tools and obscure techniques, I will walk through the process of compromising an organization without the use of normal exploit code. Many of the tools will be made available as new modules for the Metasploit Framework. REVIEWER NOTES: This is a monstrous presentation and will absolutely require the 150-minute time slot. For a smaller version of this presentation, please see my other submission (System Cracking with Metasploit 3). The goal of this presentation is to show some of the non-standard ways of breaking into networks, methods that are often ignored by professional pen-testing teams.

Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.

Penetration testing often focuses on individual vulnerabilities and services. This talk introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using combination of new tools and obscure techniques, I will walk through the process of compromising an organization without the use of normal exploit code. Many of the tools will be made available as new modules for the Metasploit Framework. REVIEWER NOTES: This is a monstrous presentation and will absolutely require the 150-minute time slot. For a smaller version of this presentation, please see my other submission (System Cracking with Metasploit 3). The goal of this presentation is to show some of the non-standard ways of breaking into networks, methods that are often ignored by professional pen-testing teams.

ISTS - i sh0t the sheriff
Edição 15 - 3.27.2007

ISTS - i sh0t the sheriff

Play Episode Listen Later Mar 28, 2007 66:36


1 hora e pouquinho Eventos: CFP SECOMP 2007 - Seminário em Computação 2007: Tecnologias Móveis - 29 de agosto a 1o. de setembro de 2007 - Itajubá -MG, Brasil Black Hat Europe 2007 Briefings and Training Moevenpick Hotel Amsterdam City Centre, the Netherlands Training: 27-28 March 2007 Briefings: 29-30 March 2007 Security Week, (02-04/2007) next week... Destaques: palestra do Nelson, painel ISSA com Luiz e outros, workshop Luiz e Happy Hour IStS Notícias: Metasploit Framework versão 3.0 http://framework.metasploit.com/. Secmaster Google phone - estamos de olho Crianças instalando keyloggers em computadores no parlamento do Reino Unido Wifi positioning system Tintas anti-wifi SHMOOCON 07 Musica da Semana: BYOB - System of a Down 10 "fatos" sobre smartphones

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 75:11


"This talk shall focus on exploit development from vulnerabilities. We have seen many postings on security forums which vaguely describe a vulnerability, or sometimes provide a "proof-of-concept" exploit. The Metasploit Framework is a powerful tool to assist in the process of vulnerability testing and exploit development. The framework can also be used as an engine to run exploits, with different payloads and post-exploitation mechanisms. In this talk, we shall look at how we can construct exploits from published vulnerabilities, using facilities provided by the Metasploit framework. A Unix and a Windows vulnerability example shall be covered. Next we shall demonstrate how to write this exploit as a Metasploit plug-in, so that it can be integrated into the Metasploit Framework. Participants shall get insights into discovery and verification of vulnerabilities, finding the entry points, gaining control of program flow, choices of shellcode and finally writing a working exploit for the vulnerability. Participants shall also get an overview of Metasploit's internal modules and how to integrate custom exploits with the Metasploit framework."

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

"Over the last three years, the Metasploit Framework has evolved from a klunky exploit toolkit to a sleek EIP-popping machine. The latest version of the Framework is the result of nearly two years of development effort and has become a solid platform for security tool development and automation. In this talk, we will demonstrate how to use the new Framework to automate vulnerability assessments, perform penetration testing, and build new security tools that interact with complex network protocols. HD Moore is Director of Security Research at BreakingPoint Systems where he focuses on the security testing features of the BreakingPoint product line. Prior to joining BreakingPoint, HD co-founded Digital Defense, a managed security services firm, where he developed the vulnerability assessment platform and lead the security research team. HD is the founder of the Metasploit Project and one of the core developers of the Metasploit Framework, the leading open-source exploit development platform. In his spare time, HD searches for new vulnerabilities, develops security tools, and contributes to open-source security projects."

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 75:11


This talk shall focus on exploit development from vulnerabilities. We have seen many postings on security forums which vaguely describe a vulnerability, or sometimes provide a "proof-of-concept" exploit. The Metasploit Framework is a powerful tool to assist in the process of vulnerability testing and exploit development. The framework can also be used as an engine to run exploits, with different payloads and post-exploitation mechanisms. In this talk, we shall look at how we can construct exploits from published vulnerabilities, using facilities provided by the Metasploit framework. A Unix and a Windows vulnerability example shall be covered. Next we shall demonstrate how to write this exploit as a Metasploit plug-in, so that it can be integrated into the Metasploit Framework. Participants shall get insights into discovery and verification of vulnerabilities, finding the entry points, gaining control of program flow, choices of shellcode and finally writing a working exploit for the vulnerability. Participants shall also get an overview of Metasploit's internal modules and how to integrate custom exploits with the Metasploit framework."

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Over the last three years, the Metasploit Framework has evolved from a klunky exploit toolkit to a sleek EIP-popping machine. The latest version of the Framework is the result of nearly two years of development effort and has become a solid platform for security tool development and automation. In this talk, we will demonstrate how to use the new Framework to automate vulnerability assessments, perform penetration testing, and build new security tools that interact with complex network protocols. HD Moore is Director of Security Research at BreakingPoint Systems where he focuses on the security testing features of the BreakingPoint product line. Prior to joining BreakingPoint, HD co-founded Digital Defense, a managed security services firm, where he developed the vulnerability assessment platform and lead the security research team. HD is the founder of the Metasploit Project and one of the core developers of the Metasploit Framework, the leading open-source exploit development platform. In his spare time, HD searches for new vulnerabilities, develops security tools, and contributes to open-source security projects."

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.

Penetration testing often focuses on individual vulnerabilities and services. This talk introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using combination of new tools and obscure techniques, I will walk through the process of compromising an organization without the use of normal exploit code. Many of the tools will be made available as new modules for the Metasploit Framework. REVIEWER NOTES: This is a monstrous presentation and will absolutely require the 150-minute time slot. For a smaller version of this presentation, please see my other submission (System Cracking with Metasploit 3). The goal of this presentation is to show some of the non-standard ways of breaking into networks, methods that are often ignored by professional pen-testing teams.

Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.

Penetration testing often focuses on individual vulnerabilities and services. This talk introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using combination of new tools and obscure techniques, I will walk through the process of compromising an organization without the use of normal exploit code. Many of the tools will be made available as new modules for the Metasploit Framework. REVIEWER NOTES: This is a monstrous presentation and will absolutely require the 150-minute time slot. For a smaller version of this presentation, please see my other submission (System Cracking with Metasploit 3). The goal of this presentation is to show some of the non-standard ways of breaking into networks, methods that are often ignored by professional pen-testing teams.