#509: AI + Metasploit = Terrifyingly Easy Hacking is here (demo)
David Bombal11 Syys

#509: AI + Metasploit = Terrifyingly Easy Hacking is here (demo)

In this ethical lab demo, David Bombal and Kyle Winters connect Claude (LLM) to Metasploit through an MCP (Model Context Protocol) server to automate real attacks. Watch AI perform recon, generate a risk report, and execute VSFTPD backdoor, EternalBlue (SMBv1), and UnrealIRCD—dropping benign files on Linux and Windows with simple prompts. Educational use only on intentionally vulnerable VMs. Do not attack systems you don’t own or lack permission to test. What you’ll see • How MCP bridges an AI to real tools (Metasploit RPC) • AI-driven scanning + auto security report (services, versions, risks) • Prompted exploits: VSFTPD, EternalBlue, UnrealIRCD • Why this lowers barriers for red teams—and what blue teams should do // Sponsored SEGMENT // Big thanks to Cisco for sponsoring this video. // Kyle Winters SOCIAL // LinkedIn: / kyle-m-winters Cisco Blogs:  https://blogs.cisco.com/author/kylewi... // Websites REFERENCE // MetasploitMCP by GH05TCREW: https://github.com/GH05TCREW/Metasplo... Kareem Iskander's MCP blogs: https://blogs.cisco.com/author/kareem... Cisco U.: https://u.cisco.com?ccid=cisco-u&dtid... // Video REFERENCE // MCP Demo using Pythong: • MCP Demo using Python, AI and a self heali... Brute Force SSH: • Brute Force SSH & Build a Honeypot Now (Hy... Hacking LLMs: • Hacking LLMs Demo and Tutorial (Explore AI... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:58 - Disclaimer 01:00 - Introducing Metasploit MCP Server (by GH05TCREW) 03:01 - Metasploit MCP Demo 1 05:12 - Metasploit MCP Demo 2 10:59 - Metasploit MCP Demo 3 16:18 - Metasploit MCP Demo 4 19:15 - Metasploit MCP Demo 5 21:45 - How AI is changing cybersecurity 23:07 - Metasploit MCP Demo 5 continued 26:51 - Metasploit MCP server summary 28:00 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Jaksot(500)

#70: Boson ExSim CCNA Giveaway

#70: Boson ExSim CCNA Giveaway

Want to win a copy of the Boson ICND1 or ICND2 ExSim Exam Simulation software? Now's your chance! Competition link: http://bit.ly/2GJLrwV Boson ExSim-Max Practice Exams: http://bit.ly/BosonExSim Boson home page: http://bit.ly/2LX27oL Boson NetSim: http://bit.ly/BosonNetSim #ccna #boson #exsim

5 Elo 20196min

#69:  Python and Jinja2 Cisco Network Automation

#69: Python and Jinja2 Cisco Network Automation

CSV files, Jinja2 templates, python and Network Automation! Wow - that is a lot! But Hank Preston demonstrates how to use all of those in this video. Menu: 01:11 - Introduction 02:29 - Spreadsheet conversion 04:19 - Importing using Python 13:41 - What are the advantages of using Jinja2 templates? 16:35 - Skills that Network Engineers should learn? 19:00 - The working template 32:09 - Exporting to a text file 35:22 - Using a script 37:46 - How would I turn this into something that configures a device? 51:18 - Should I use CSV/YAML/JSON? Links: Video 1 in series: https://youtu.be/PB9D4RqBaQw Video 2 in series: https://youtu.be/23hPg88pZBo Start Now Page on Devnet: http://bit.ly/2WBjb5v NetDevOps Live Episode on Python Libraries including CSV: http://bit.ly/2VjbGP4 Coding Fundamentals Learning Labs: http://bit.ly/2vU1BO8 Network programmability Basics Video Series covering CSV: http://bit.ly/2JzlbY4 Jinja2 template video: https://youtu.be/ARFU73tah8A #python #jinja2 #devnet

2 Elo 201954min

#68: GNS3 Docker Persistent Containers

#68: GNS3 Docker Persistent Containers

GNS 2.2 now supports additional persistent volumes for Docker containers. This means you won't keep losing your installed applications and work! Great new feature! GNS3 2.2 New Features: http://bit.ly/2LnId5Q Download GNS3 2.2 here: https://github.com/GNS3/gns3-gui/releases #gns3 #docker #gns3docker

25 Heinä 20196min

#66: Cisco VIRL 2: Massive New changes!

#66: Cisco VIRL 2: Massive New changes!

Massive changes coming in VIRL 2: No VM Maestro client, no OpenStack, entirely new middleware, new GUI, HTML5 client - lots of new and exciting changes! Menu: 00:45 - Overview of Changes 02:55 - Introduction 03:20 - API Documentation 04:20 - Python client library 05:15 - OpenStack 06:50 - The Dashboard and new components 09:15 - Boot progress monitoring 10:40 - Device limitation 12:00 - Advice for sending Cisco requests 12:38 - Demo for interacting with console 17:04 - Web browser application 19:18 - Installation 19:35 - VNC 22:19 - Simulate and packet capture features 23:30 - Breakout Utility 26:09 - Do you need to run a VPN client? 28:45 - Release date? 29:25 - VIRL compatibility and demo virl is CISCO'S POWERFUL, EASY-TO-USE, AND EXTENSIBLE NETWORK MODELING AND SIMULATION ENVIRONMENT. - Build highly-accurate models of existing or planned networks. - Design, configure, and operate networks using authentic versions of Cisco's network operating systems - Build using common platforms like IOSv, IOSv Layer-2, IOS-XRv, NX-OSv, CSR1000v and ASAv. All Included - Integrate 3rd-party virtual machines, appliances, VNFs, and servers. - Connect real and virtual networks to form high-fidelity development and test environments. - Design and test anywhere - VIRL is portable! #virl #ciscovirl #virl2

19 Heinä 201935min

#65: GNS3 Symbols

#65: GNS3 Symbols

GNS3 symbols are now built into GNS3 2.2! You can access custom and affinity symbols directly from within GNS3. GNS3 Custom Symbols: https://youtu.be/51zaAHhdgzQ GNS3 2.2 New Features: http://bit.ly/2LnId5Q Download GNS3 2.2 here: https://github.com/GNS3/gns3-gui/releases You can switch between different builtin symbols themes in the GNS3 preferences: Classic symbol theme Affinity square blue Affinity square gray Affinity square red Affinity circle blue Affinity circle gray Affinity circle red #gns3 #gns3symbols #gns3icons

18 Heinä 20194min

#64: GNS3 2.2 New Feature: Link Status Detection

#64: GNS3 2.2 New Feature: Link Status Detection

Fantastic new feature is available in GNS3 2.2! Cisco IOS routers and switches (and others) can detect the status of interfaces - is the cable plugged in? Or not? Has the link been suspended? GNS3 2.2 New Feature: Detect when a link is plugged/unplugged for Qemu VMs. Qemu VMs will be informed when a link is plugged or unplugged or even when suspended. This should be really useful when testing redundancy scenarios, protocol convergence etc. This will really help with gns3 labs in future! #gns3 #gns3tutorial GNS3VM

16 Heinä 20199min

#63: tshark and Termshark tutorial: Capture and view wireshark captures in a console

#63: tshark and Termshark tutorial: Capture and view wireshark captures in a console

Get the course for $10 on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb This is a tshark and Termshark tutorial: It is now possible to capture and view Wireshark captures directly in a console window. No need for a graphical user interface (GUI) - you can do all of this directly within a Linux terminal or console. tshark and Termshark installation: ============================== tshark: apt-get install tshark Termshark: wget https://github.com/gcla/termshark/releases/download/v1.0.0/termshark_1.0.0_linux_x64.tar.gz tar -xf termshark_1.0.0_linux_x64.tar.gz cd termshark_1.0.0_linux_x64 install termshark /usr/local/bin How to use: tshark -w tshark1.pcap termshark -r tshark1.pcap Help: termshark UserGuide: https://github.com/gcla/termshark/blob/master/docs/UserGuide.md Course overview: Do you know network protocols? Do you know how to hack? Want to learn wireshark and have some fun with Ethical hacking? This is the course for you: Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course: - Capture Telnet, FTP, TFTP, HTTP passwords. - Replay VoIP conversations. - Capture routing protocol (OSPF) authentication passwords. - Troubleshoot network issues. - Free software. - Free downloadable pcapng files. - Answer quiz questions. The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. Protocols we capture and discuss in this course include: - Telnet - FTP - TFTP - HTTP - VoIP - OSPF - EIGRP - DNS - ICMP Who this course is for: Network Engineers Network Architects Ethical hackers Networking Students #wireshark #termshark #tshark

9 Heinä 201912min

#62:  GNS3 IOS Images: Build a Cisco VIRL gns3 network

#62: GNS3 IOS Images: Build a Cisco VIRL gns3 network

In this video I show you how to download Cisco IOS images and Cisco VIRL images to run IOSv, IOSvL2 in GNS3 2.2. I can only show you LEGAL ways of doing this. Please DO NOT ask for images that I am unable to provide. Previous videos in this series: Video 1: https://youtu.be/LvLGEKD-oqA Video 2: https://youtu.be/R6fSub4ycTk Video 3: https://youtu.be/anYw9pbAUiI Want to know to install, configure and setup GNS3 2.2? Well, these videos show you. In my first video, I show you how to download the components you require and how to install the GNS3 GUI on Windows 10. We build a basic network with GNS3. In the second video I show you how to use the GNS3 2.2 Web-UI and in this video I show you how to integrate the GNS3 VM with the GNS3 GUI. In the next video I show you how to build a network using Cisco VIRL IOS images. Thank you Jeremy for all your hard work creating and updating GNS3! #gns3 #gns3virl #gns3ios

8 Heinä 201914min