• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Learn to use Metasploit – Tutorials, Docs & Videos

July 20, 2007

Views: 244,085

Metasploit is a great tool, but it’s not the easiest to use and some people get completely lost when trying to get the most out of it.

To help you guys out here is a bunch of links, videos, tutorials and documents to get you up to speed.

You can start with this, a good flash tutorial that shows you step by step how to use it:

Metasploit at Iron Geek

This video covers the use of Metasploit, launched from the Auditor Boot CD, to compromise an unpatched Windows XP box by using the RPC DCOM (MS03-026) vulnerability.

There’s a presentation by HD Moore himself at Cansecwest 2006:

csw06-moore.pdf

And a couple of videos spawned from that here:

Computer defense – TASK Presentation

The most up to date video for Metasploit 3 can be found here:

Exploring Metasploit 3 and the New and Improved Web Interface – Part 1

Exploring Metasploit 3 and the New and Improved Web Interface – Part 2

The Metasploit site itself also has some fantastic documentation, a good place to start is here:

http://framework.metasploit.com/msf/support

The Metasploit book is a good start too:

Using Metasploit

The Security Focus article is a good reference too if a little outdated:

Metasploit Framework, Part 1
Metasploit Framework, Part 2

So get hacking, Metasploit is great!

Share
Tweet24
Share
Buffer
WhatsApp
Email
24 Shares

Filed Under: Exploits/Vulnerabilities, Hacking Tools Tagged With: exploits, hacking-framework, metasploit, vulnerabilities



Reader Interactions

Comments

  1. backbone says

    July 20, 2007 at 1:37 pm

    it’s a great resource list, and mostly practical because everything is shown… and when I think of the script kiddies who don’t want to learn and read… this will be a perfect resource for them…

  2. Bogwitch says

    July 20, 2007 at 7:25 pm

    Backbone, my thoughts exactly.

    Darknet – should you be promoting this sort of thing?

    “Don’t learn to hack – hack to learn”

    Yeah, OK, the skiddies are more likely to be on Irongeek than Darknet and obscurity is no security but all the same….

  3. backbone says

    July 20, 2007 at 8:38 pm

    hehe Bogwitch the motto could be interpreted in many ways…

    I think darknet should make an article stating:

    “We do not promote scrip kiddying!”

  4. Bogwitch says

    July 20, 2007 at 8:54 pm

    I’ve got to admit, I use Metasploit during pen tests because it’s easy. However, I still feel guilty – like I’m cheating in some way. That said, my customers prefer the smaller bills and as a practical demonstration to them, it is almost guaranteed to get them to sign for the remedial work necessary! :-)

  5. backbone says

    July 21, 2007 at 4:22 pm

    you should not feel like your cheating because you are using it in a pen-test (it was made for this kind of job), and as a pen-tester you at least know what actually metasploit does ;)

  6. CG says

    July 22, 2007 at 10:37 pm

    thanks for posting my vid as “most updated MSF video”

    there is actually a 2nd part on EthicalHacker.net :

    http://www.ethicalhacker.net/content/view/136/24/

  7. Darknet says

    July 23, 2007 at 6:53 am

    Yeah well I do use Metasploit in pen testing too, if clients need a PoC it’s sometimes the easiest way to do it.

    I like to share info though, if it enables the script kiddies to do bad stuff, well that’s tough for the people with insecure machines.

    But I prefer to think of it as educating, you can’t ban guns just because some people might shoot each other ;)

    CG: Thanks for the info, will add it in.

  8. SN says

    July 23, 2007 at 7:29 pm

    cool

  9. backbone says

    July 23, 2007 at 8:33 pm

    Darknet I agree with you, but trust me if it where a non video tutorial, less script kiddies would have tried to learn metasploit that way =)

  10. TheRealDonQuixote says

    July 24, 2007 at 5:03 am

    Fer wut itz worth:
    @DRKNT – Nice collection of info on Metasploit. I say Darknet is better off teaching “Hack To Learn”, in order to convert a skiddie. After all, history has taught us, the best way to fight an idea is with another idea.

    @bckbn – Video Tuts on everything from Metasploit to simple kismet wardriving are everywhere, and they only become more prolific with the amount of traffic that skiddies generate trying to get “learn” an easy hack. Yep, the skids can be problematic, but trying to hinder them is like trying to hold back the ocean with your hand. In fact its better to let the skids learn a hard lesson or two as most will get hacked trying to take the easy way, more and more black hats are preying on them and their uber vulnerable pay pal accts. Either way, a skiddie will usually burn out from being too lazy to learn or getting hacked too many times, or they move on up the chain and start being proactive about knowledge and the power of information.

    However, in light of the possible maladies a skiddie may generate, one has to start somewhere, maybe even (dare I say) as a skiddie. I was too dumb to be a skiddie, so I had to learn by doing and reading actual paper books, plus I was always a bit paranoid about the fedz. Anyway, not all of us are old enough to have started futzing with computers during the dawn of the internets.

    To be honest, I don’t mind skiddies all that much, because they are in a place where people like Darknet can influence them into another level of learning and knowledge. Of course, not everyone is on the path to righteousness…

    L8s
    TRDQ

  11. Christophe Vandeplas says

    July 24, 2007 at 11:16 am

    H D Moore also gave a talk at FOSDEM 2007.

    You can find the slides here: http://fosdem.org/2007/slides/maintracks/metasploit.pdf
    and the video/recording here: http://video.fosdem.org/2007/FOSDEM2007-Metasploit.ogg

  12. Sandeep Nain says

    July 25, 2007 at 1:59 am

    Hey Darknet,
    Thanks for the videos. They are awesome and and very helpful for beginners in security field.

    Keep posting such videos…

    CG: Its a great video… kudos to you

  13. moons says

    July 25, 2007 at 12:01 pm

    ah yes metasploit, theres another tool called SecurityForest Exploitation Framework, available at :
    http://www.securityforest.com/wiki/index.php/Category:ExploitTree which is rather similar to the metaploit framework as well.

    good videos.

  14. Sandeep Nain says

    July 25, 2007 at 12:31 pm

    Hi moons

    thanks a lot.. videos are pretty good and helpful…

    as i said earlier…such videos great for security newbies…

  15. backbone says

    July 25, 2007 at 8:51 pm

    I didn’t know of SecurityForest Exploitation Framework, but I suppose that metasploit has a bigger community that it…

  16. Sandeep Nain says

    July 26, 2007 at 6:13 am

    secirutyforest exploitation framework is similar to meta exploit but has a lot of preconfigured exploits available at exploit tree…

    its not very popular yet as its still in beta.

  17. Darknet says

    July 26, 2007 at 8:07 am

    We have mentioned Security Forest and their BETA exploitation framework before in April 2006 when FrSIRT starting charging for access.

    Alternatives to FrSIRT – Where to Download Exploits?

    It’s also been linked in our sidebar since we started :)

    I guess that was before many of you started reading though.

    Christophe: Thanks for the additional links!

    TheRealDonQuixote: I agree, better to share so everyone is aware rather than try and hide it and keep it away from certain people.

  18. backbone says

    July 26, 2007 at 6:44 pm

    Darknet: just a little mention, if you have got the time try do search for video tutorials on how to secure system first, then how to exploit them ;)

    I really think that will have much more success…

  19. Sandeep Nain says

    July 27, 2007 at 12:01 am

    Well i think, if someone knows how to exploit a system it becomes much more easier for him/her to secure the syetem. so such tutorials are must.

  20. TheRealDonQuixote says

    July 27, 2007 at 12:02 am

    Man, I was sooooo pissed when FrSIRT went all money. That’s where I got the source for my first exploit, THE JPEG OF DEATH.

    I didn’t know about “Security Forest” either. Sorry I didn’t see it earlier DKNT :|
    @Moons – thx for bringing SF back to our attention!!

    @BKBN – One question. How can one completely secure their system, without knowing all the holes to plug first? I think, hopefully, DKNT and I are in agreement that its better to show everyone, all the security holes we can find, so that they know what it is they need to secure. How would anyone know to block or monitor port 23, if they didn’t know that naughty black hats check that port first for simple telnet hacks? Ok so that was two questions. :D

    Sorry I’m so long winded on this subject (informing people vs keeping some info for those “in the know”). I had a big flame fest over a post on my blog, titled “How To Make Crack and Freebase Cocaine”. Everyone was going nuts cause I had found the info via google and then reposted it. The point was that any kid COULD find this info, and that parents need to monitor their kids habits on the net, cause the info is and will always be there somewhere. But I got slammed from all sides about how little kids could be reading my blog and seeing this. The point was lost because peeps had an instant emotional reaction instead of realizing that if a total N00b like me could find it then anyone could.
    Again, sorry so long.
    TRDQ

  21. Sandeep Nain says

    July 27, 2007 at 12:12 am

    Backbone: just telling the security professionals, that you should filter the input/output for HTML and javascript to stop XSS attacks won’t be enough till the time they see how it can be exploited..
    and we all know filtering the ‘

  22. mike says

    August 17, 2007 at 11:17 pm

    hey, i know this is a little out of context, but for the past month or so, i have become really interested in the world of hacking and would love to better my knowledge of how security systems work and how to exploit vulnerabilities. i am not one of those stereotypical losers who think they have the rite to just ask around so they can get into their friends’ box, but i am genuinely interested in this. i have downloaded metasploit on my laptop and would like to test it out on another comp connected to my wireless network, to see how hard/easy it is to get into my own system, but i dont have a clue how to use this, would it be possible if you could point me in the rite direction maybe to a tutorial for newbies, where there is a step by step explanation and how it all works.

  23. CG says

    August 27, 2007 at 2:53 am

    thanks for the props guys!

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 222

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 330

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 527

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 512

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 704

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,911

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,292,290)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,074)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,616)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,676)
  • Password List Download Best Word List – Most Common Passwords (933,466)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,133)
  • Hack Tools/Exploits (673,289)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,145)

Search

Recent Posts

  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy