Part of ‘Kali Linux – Backtrack Evolved: Assuring Security by Penetration Testing’ video series. For the full Course visit:

Automated exploitation platform / use Metasploit Pro to perform discovery, vulnerability mapping, and exploitation:
o Create a new project and perform network discovery
o Use Nexpose to perform a vulnerability scan or import Nessus results
o Use vulnerabilities to exploit systems on the network and interact with the acquired shells


For the latest in application development video tutorials, please visit:

Find us on Facebook —
Follow us on Twitter –