A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Privilege Escalation with the Metasploit Framework Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

Privilege Escalation with the Metasploit Framework
Derbycon 2012

As part of the State of the Framework Address at last year’s DerbyCon, I discussed Post modules, the newest module type available in the Metasploit Framework. This time around, I’ll be focusing on a fusion of Post modules and Exploit modules: Msf::Exploit::Local, for when you absolutely, positively, have to have root (and don’t mind an occasional kernel panic). This talk will cover some fun local exploits, from antiquity to modern times, including how to use and create them for the Metasploit Framework.

egyp7

egyp7 is a software developer for Rapid7 where he is Open Source Project Manager and a core developer for the Metasploit Framework. Before coming to Rapid7 to work on Metasploit, he was a Cybersecurity researcher for Idaho National Laboratory where he discovered numerous vulnerabilities in SCADA and Industrial Control Systems and probably didn’t write Stuxnet.
 

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast