WEBVTT

00:01.260 --> 00:07.020
Now we'll start talking about the Metasploit framework, which is an open source penetration testing

00:07.230 --> 00:14.460
and the development platform program in Ruby that provides exploits for a variety of applications and

00:14.460 --> 00:15.510
operating systems.

00:16.140 --> 00:22.020
Metasploit is one of the most commonly used penetration testing tools in the world.

00:23.910 --> 00:31.320
This exploitation framework consists of a group of tools and utilities put together to conduct security

00:31.320 --> 00:31.920
audits.

00:32.160 --> 00:39.000
This security vulnerabilities enumerate the networks and evade detection or hex systems.

00:40.740 --> 00:49.470
It can be used by both white and black pickers because Metasploit is launching real, not simulated

00:49.470 --> 00:50.100
attacks.

00:51.610 --> 00:56.650
In this lecture, I'll show you how to start and update the Metasploit framework.

00:57.610 --> 01:01.480
If you are using Kali Linux and I advise you to use it.

01:01.690 --> 01:03.640
Metasploit is part of Kali.

01:04.810 --> 01:09.460
We started by simply executing MSF console in a terminal.

01:10.120 --> 01:15.250
MSF console is the most popular interface to the Metasploit framework.

01:15.670 --> 01:23.110
It provides an all in one centralised console and allows you efficient access to virtually all of the

01:23.110 --> 01:26.170
options available in the Metasploit framework.

01:26.530 --> 01:27.370
Let's launch it.

01:33.880 --> 01:36.070
It has started successfully.

01:37.560 --> 01:40.680
Let's move on and see how to update Metasploit.

01:41.770 --> 01:49.240
This is especially important because the Metasploit team is continuously releasing improvements and

01:49.240 --> 01:51.190
exploits for new vulnerabilities.

01:52.240 --> 02:04.810
As you can see, this is Metasploit Castle version 6.1. 27 and there are 2196 exploits available.

02:05.650 --> 02:13.210
Until recently, we could simply update Metasploit to the latest version by executing a massive update.

02:16.360 --> 02:17.930
I'm running it myself.

02:18.010 --> 02:18.640
Update.

02:20.830 --> 02:28.180
But as you can see, Metasploit now these points that the command is no longer supported when Metasploit

02:28.180 --> 02:31.080
is part of an operating system such as Kali.

02:31.630 --> 02:36.100
And to operate it, we need to use the API package manager.

02:37.210 --> 02:49.510
So to update it, i'm running sudo apt update ampersand and percent sudo apt to install metasploit framework.

02:51.370 --> 02:52.570
And the best are these kali.

02:58.680 --> 03:03.540
By the way, app to install is installing or updating the package.

03:03.660 --> 03:05.010
Two weeks later the version.

03:10.570 --> 03:11.340
I'm typing.

03:11.350 --> 03:11.740
Why?

03:14.230 --> 03:18.640
Downloading and installing the latest version of Metasploit.

03:23.420 --> 03:27.440
It was updated and I'm starting MSF council again.

03:27.980 --> 03:34.400
You know the other terminology, I'm exiting the previous Metasploit console in time.

03:34.400 --> 03:35.780
We're starting it again.

03:43.850 --> 03:49.880
This is the latest version of Metasploit, which is version 6.1. 39.
