Page 17 of 26

Armitage and Metasploitable Linux Seminar

Here you can find the images and installation instructions for preparing your lab environment (Kali Linux as an attacker machine and Metasploitable Linux as a victim machine). If you have any questions, email Vitaly at vford42@students.tntech.edu or Jacob at jmwheeler42@students.tntech.edu

How to set up a new virtual machine:

http://blogs.cae.tntech.edu/cybereagles/2013/10/17/linux-informational-session/

Kali Linux:

http://www.kali.org/downloads/

Metasploitable Linux:

http://sourceforge.net/projects/metasploitable/

Script to fix a metasploit problem when you launch Armitage in Kali:
#!/bin/bash
# script to fix metasploit problem
echo ‘attempting to start’
service postgresql start
service metasploit start
service metasploit stop
echo ‘finished’

Metasploit. Penetration and Exploitation Toolkit.

Metasploit. Penetration and Exploitation Toolkit.

Thursday, October 30th

by

Jacob Wheeler and Anh Dao

 

Bruner 207, Dead Hour, 11 am

(We will have PIZZA and drinks!)
Annual Membership Dues: $10

Social Engineering: Helpful Links

Here is a list of some information to start with:

Social engineer toolkit homepage
List of videos from different conferences
Names to check out:
  • Dave Kennedy
  • Raphael Mudge
  • Kevin Mitnick

Social Engineering: How To

Enjoy Lunch and a Presentation on

Social Engineering Toolkit

by

Jacob Wheeler

Bruner 404, 11 am

Pizza and Drinks!

« Older posts Newer posts »

© 2024 Cyber Eagles

Theme by Anders NorenUp ↑