Videos from Pentesting with Metasploit
-
Post-Exploitation: Pivoting -
You are watching this now -
Client side Exploits -
Backdoor Executables