A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Introduction to Metasploit Post Exploitation Modules (Hacking Illustrated Series InfoSec Tutorial Videos)

Introduction to Metasploit Post Exploitation Modules
Derbycon 2012

The Metasploit framework provides penetration testers with an unprecedented ability to find and exploit vulnerable machines, but a good penetration tester knows exploitation is only the beginning. Metasploit post exploitation modules allow penetration testers to gather data from exploited machines, including hashes, tokens, application passwords and much more. During this presentation we will discuss useful post exploitation modules, developing post exploitation modules, and contributing modules to the Metasploit framework.

Stephen Haywood (AverageSecurityGuy)

Stephen Haywood (aka AverageSecurityGuy) has over ten years experience in the information technology field working as a programmer, technical trainer, network operations manager, and information security consultant. He holds a Bachelor of Science in Math and a number of industry certifications, including the Certified Information Systems Security Professional(CISSP), Offensive Security Certified Professional(OSCP), and GIAC Penetration Tester(GPEN). Over the last five years, he has helped improve the network security of a number of small businesses ranging in size from ten employees to hundreds of employees by offering practical, time-tested information security advice. In addition, he has contributed to the Metasploit Framework by rewriting the OpenVAS connector and by writing a number of post exploitation modules.

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast