RE: Metasploit

From: Tyler Reguly (treguly@ncircle.com)
Date: Tue May 08 2007 - 15:16:57 EDT


There are a couple of videos here:

http://www.computerdefense.org/?p=53

-----Original Message-----
From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com] On Behalf Of Robert Belk
Sent: Tuesday, May 08, 2007 2:44 PM
To: Adrian Chiang; pen-test@securityfocus.com
Subject: RE: Metasploit

Here is a great flash tutorial that shows you step by step how to use
it.

http://www.irongeek.com/i.php?page=videos/metasploit1

Thank you,
 
Robert Belk
Network Security Administrator

-----Original Message-----
From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]
On Behalf Of Adrian Chiang
Sent: Tuesday, May 08, 2007 4:00 AM
To: pen-test@securityfocus.com
Subject: Metasploit

Hi all,

Anybody know of any tutorial on how to use metasploit effectively? And
e-book or URL to such resources is appreciated.

Adrian

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------

#####################################################################################
Note:
This message is for the named person's use only. It may contain confidential,
proprietary or legally privileged information. No confidentiality or privilege
is waived or lost by any mistransmission. If you receive this message in error,
please immediately delete it and all copies of it from your system, destroy any
hard copies of it and notify the sender. You must not, directly or indirectly,
use, disclose, distribute, print, or copy any part of this message if you are not
the intended recipient. Western National Bank and any of its subsidiaries each reserve
the right to monitor all e-mail communications through its networks.

Any views expressed in this message are those of the individual sender, except where
the message states otherwise and the sender is authorized to state them to be the
views of any such entity.

Thank You.
#####################################################################################

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------

Internal Virus Database is out-of-date.
Checked by AVG Free Edition.
Version: 7.5.463 / Virus Database: 269.5.6/770 - Release Date: 4/20/2007 6:43 PM
 

Internal Virus Database is out-of-date.
Checked by AVG Free Edition.
Version: 7.5.463 / Virus Database: 269.5.6/770 - Release Date: 4/20/2007 6:43 PM
 

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:47 EDT