Marvins Underground Lectures
Welcome
Login / Register


Penetration Testing


  • 04:45 Getting started w/BackTrack4 VM installation

    Getting started w/BackTrack4 VM installation

    by Admin Added 40 Views / 0 Likes

    A quick tutorials on working with a fresh VMware version of BackTrack4. Logging in, changing password, starting the gui, and activating network interfaces

  • 06:25 Configure Pure-FTPd in BackTrack

    Configure Pure-FTPd in BackTrack

    by Admin Added 43 Views / 0 Likes

    A tutorial on configuring pure-FTPd in BackTrack4 and testing your FTP user

  • 07:54 The basics of working with Netcat - Part 1

    The basics of working with Netcat - Part 1

    by Admin Added 35 Views / 0 Likes

    A quick tutorial of how to set up a two way connection with Netcat in order to have a text chat as well as transfer text files.

  • 06:06 The basics of working with Netcat - Part 2

    The basics of working with Netcat - Part 2

    by Admin Added 41 Views / 0 Likes

    How to use netcat to connect to a remote shell and create a one-shot webserver.http://danscourses.com

  • 07:31 Use Metasploit to run an exploit and launch Meterpreter- part 1

    Use Metasploit to run an exploit and launch Meterpreter- part 1

    by Admin Added 39 Views / 0 Likes

    http://danscourses.com - A tutorial on using the Metasploit msfconsole to run an exploit and launch Meterpreter against a vulnerable server. Pentesting with BackTrack5

  • 03:38 Use Metasploit to run an exploit and launch Meterpreter- part 2

    Use Metasploit to run an exploit and launch Meterpreter- part 2

    by Admin Added 50 Views / 0 Likes

    http://danscourses.com - A tutorial on running a hashdump with Meterpreter and cracking the Windows passwords with John the Ripper. Pentesting with BackTrack5

  • 13:48 Run an exploit and use pivoting with Meterpreter, Metasploit and Backtrack5

    Run an exploit and use pivoting with Meterpreter, Metasploit and Backtrack5

    by Admin Added 39 Views / 0 Likes

    Use pivoting to hack clients that aren't directly accessible.First, we exploit a publicly-visible client. Then, using pivoting, we attack a second client on the same network. Outside access to the second client is blocked by a firewall, which is why we mu

  • 11:29 Exploit and maintain access with a Meterpreter backdoor using Metasploit

    Exploit and maintain access with a Meterpreter backdoor using Metasploit

    by Admin Added 37 Views / 0 Likes

    http://danscourses.com - A Metasploit demonstration of exploiting a Windows XP Pro machine and maintaining access to the victim computer by setting up a Meterpreter persistent backdoor using Backtrack5This video is a redo of a previous video fixing a flaw

  • 07:42 How to execute a client side exploit with Metasploit and Backtrack5

    How to execute a client side exploit with Metasploit and Backtrack5

    by Admin Added 45 Views / 0 Likes

    http://danscourses.com - In this demonstration, I exploit a computer by launching a client side attack, using an exploit delivered through a webpage/webserver using Metasploit and Backtrack5.MORE DAN'S COURSESSubscribe!http://www.youtube.com/subscription_

  • 11:47 Encrypt data transfers with Stunnel and OpenSSL - Part 1

    Encrypt data transfers with Stunnel and OpenSSL - Part 1

    by Admin Added 51 Views / 0 Likes

    http://danscourses.com - In part 1, I discuss the concept of securing network communication with stunnel and I list the software downloads needed for Windows and Linux. The computers used in the demonstration are Backtrack5 Linux and Windows XP Pro.For mo

  • 10:56 Encrypt data transfers with Stunnel and OpenSSL - Part 2

    Encrypt data transfers with Stunnel and OpenSSL - Part 2

    by Admin Added 41 Views / 0 Likes

    http://danscourses.com - In part 2, I visit the various websites and download the various installers needed to run Stunnel and OpenSSL in Windows. A SSL certificate is created and Stunnel if configured in Windows. The computers used in the demonstration a

  • 13:07 Encrypt data transfers with Stunnel and OpenSSL - Part 3

    Encrypt data transfers with Stunnel and OpenSSL - Part 3

    by Admin Added 37 Views / 0 Likes

    http://danscourses.com - In part 3, I finish configuring Stunnel in Windows and in Linux and demonstrate a Netcat connection that has been encrypted using Stunnel. The computers used in the demonstration are Backtrack5 Linux and Windows XP Pro.For more in

  • 11:29 ARP Spoofing - Man-in-the-middle attack

    ARP Spoofing - Man-in-the-middle attack

    by Admin Added 45 Views / 0 Likes

    A quick tutorial on creating a man-in-the-middle attack using VMware virtual machines and Ettercap. In the demonstration, I use an Ubuntu virtual machine as the victim computer and a Backtrack 5 R1 virtual machine as the attacker. The ARP spoofing is acco

  • 12:06 Cross site scripting attacks (XSS), cookie session ID stealing -Part 1

    Cross site scripting attacks (XSS), cookie session ID stealing -Part 1

    by Admin Added 42 Views / 0 Likes

    http://danscourses.com - In part 1, I demonstrate how to set up a vulnerable webapp using XAMPP and DVWA. The goal is to practice basic cross site scripting attacks XSS using a BackTrack distribution and a Windows XP client. The tutorial covers setting up

  • 11:34 Cross site scripting attacks (XSS), cookie session ID stealing -Part 2

    Cross site scripting attacks (XSS), cookie session ID stealing -Part 2

    by Admin Added 43 Views / 0 Likes

    http://danscourses.com - In part 2, I demonstrate the process of using XSS to steal a user's session id cookie and then how to use the stolen token to gain admin access to the website web application. In the tutorial I use BackTrack, DVWA, the Tamper Data

Categories