Today, I show you how you can use the metasploit framework together with the social engineering toolkit to create and deliver a payload to a remote target. This video is completely educational and I do not endorse nor recommend and sort of “black-hat” hacking.

Credits
==========
Backtrack———-http://www.backtrack-linux.org
Tutorial #1 ——–http://www.backtrack-linux.org/forums/showthread.php?t=32931
Tutorial #2 ——–http://www.question-defense.com/2009/12/21/getting-started-with-meterpreter
UAC Bypass —–https://www.trustedsec.com/files/bypassuac.zip
Metasploit ——–http://www.metasploit.com/download/
VMWare Player – http://www.vmware.com/products/player

Technical
==========
Created by —— Joseph North
Capture ———- Camtasia Studio 7
Microphone —– ASTRO A40 Built-in Mic
Software ——— Adobe Premiere Pro CS5

source