Back to Browse

Metasploit Tutorial 4 - Shadow files, nmap, and John

329 views
Sep 17, 2024
19:43

In this tutorial I demonstrate how to obtain a backdoor of the client system, grab the shadow file, and crack the shadow file for passwords giving us entry and control of the client's computer system. This is a continuation of my former Metasploit tutorial. Credits Music by Joystock - https://www.joystock.org Disclaimer This and all videos on my channel are for educational purposes ONLY intended for those seeking a career in pentesting and/or cyber security. Do NOT use this information for illegal purposes or you will end up in jail! I am not responsible for the use, misuse, or abuse of this information as offered. I do NOT condone unethical or illegal hacking or abuse of computer systems.

Download

0 formats

No download links available.

Metasploit Tutorial 4 - Shadow files, nmap, and John | NatokHD