Part of ‘Kali Linux – Backtrack Evolved: Assuring Security by Penetration Testing’ video series. For the full Course visit:
http://www.packtpub.com/kali-linux-backtrack-evolved-assuring-security-by-penetration-testing/video?utm_source=youtube&utm_medium=video-description&utm_campaign=yt-kalilinuxbte
Automated exploitation platform / use Metasploit Pro to perform discovery, vulnerability mapping, and exploitation:
o Create a new project and perform network discovery
o Use Nexpose to perform a vulnerability scan or import Nessus results
o Use vulnerabilities to exploit systems on the network and interact with the acquired shells
——————————————–
For the latest in application development video tutorials, please visit:
http://www.packtpub.com/books/video?utm_source=youtube&utm_medium=video-description&utm_campaign=yt-kalilinuxbte
Find us on Facebook — http://www.facebook.com/Packtvideo
Follow us on Twitter – http://www.twitter.com/packtvideo
source
while registering the nexpose how should i specify the company name . i dnt have any company kindly help me
2k Followers in your IG Account Rightaway http://storage.googleapis.com/3295021779990/1317402715263.html
I dont usually comment the videos… but thank you very much !
You are the best !