#509: AI + Metasploit = Terrifyingly Easy Hacking is here (demo)

#509: AI + Metasploit = Terrifyingly Easy Hacking is here (demo)

In this ethical lab demo, David Bombal and Kyle Winters connect Claude (LLM) to Metasploit through an MCP (Model Context Protocol) server to automate real attacks. Watch AI perform recon, generate a risk report, and execute VSFTPD backdoor, EternalBlue (SMBv1), and UnrealIRCD—dropping benign files on Linux and Windows with simple prompts. Educational use only on intentionally vulnerable VMs. Do not attack systems you don’t own or lack permission to test. What you’ll see • How MCP bridges an AI to real tools (Metasploit RPC) • AI-driven scanning + auto security report (services, versions, risks) • Prompted exploits: VSFTPD, EternalBlue, UnrealIRCD • Why this lowers barriers for red teams—and what blue teams should do // Sponsored SEGMENT // Big thanks to Cisco for sponsoring this video. // Kyle Winters SOCIAL // LinkedIn: / kyle-m-winters Cisco Blogs:  https://blogs.cisco.com/author/kylewi... // Websites REFERENCE // MetasploitMCP by GH05TCREW: https://github.com/GH05TCREW/Metasplo... Kareem Iskander's MCP blogs: https://blogs.cisco.com/author/kareem... Cisco U.: https://u.cisco.com?ccid=cisco-u&dtid... // Video REFERENCE // MCP Demo using Pythong: • MCP Demo using Python, AI and a self heali... Brute Force SSH: • Brute Force SSH & Build a Honeypot Now (Hy... Hacking LLMs: • Hacking LLMs Demo and Tutorial (Explore AI... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:58 - Disclaimer 01:00 - Introducing Metasploit MCP Server (by GH05TCREW) 03:01 - Metasploit MCP Demo 1 05:12 - Metasploit MCP Demo 2 10:59 - Metasploit MCP Demo 3 16:18 - Metasploit MCP Demo 4 19:15 - Metasploit MCP Demo 5 21:45 - How AI is changing cybersecurity 23:07 - Metasploit MCP Demo 5 continued 26:51 - Metasploit MCP server summary 28:00 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Avsnitt(500)

#78: GNS3 API: Jeremy explains how the API works

#78: GNS3 API: Jeremy explains how the API works

Jeremy Grossmann (creator of GNS3) discusses the GNS3 API with David Bombal. How it works, what you can do with it and where to learn more information. All communication in GNS3 uses HTTP using the JSON format. GNS3 API documentation: http://api.gns3.net/en/latest/ David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #GNS3 #RESTAPI #GNS3API

2 Sep 20199min

#77: Jeremy explains the GNS3 2.2 Architecture

#77: Jeremy explains the GNS3 2.2 Architecture

How does the GNS3 work? Jeremy (creator of GNS3) explains the GNS3 architecture. Note: The Server component is also called the Compute Server or Compute. GNS3 consists of four parts: - the user interface or GUI (gns3-gui or gns3-web projects) - the controller (gns3-server project) - the compute server (part of the gns3-server project) - the emulators (Qemu, Dynamips, VirtualBox…) The controller pilots everything, it manages the state of each project. Only one controller should run. The GUI displays a topology representing a project on a canvas and allow to perform actions on given project, sending API requests to the controller. The compute controls emulators to run nodes. A compute that is on the same server as the controller is the same process. The compute usually starts an emulator instance for each node. GNS3 Architecture: https://gns3-server.readthedocs.io/en/latest/general.html David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com

2 Sep 201913min

#76:  GNS3: Docker containers vs Virtual Machines

#76: GNS3: Docker containers vs Virtual Machines

Why would you use Docker containers rather than Virtual Machines (VMs) in GNS3? Which is best? And which hypervisor should you use? VMware or VirtualBox? What about QEMU? Jeremy (creator of GNS3) shares his advice on what you should be using. Docker Persistent containers: https://youtu.be/K-iAD8B5noM David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #gns3 #docker #vmware

2 Sep 20198min

#75: GNS3: What is QEMU? And IOU? And ASA 8.x?

#75: GNS3: What is QEMU? And IOU? And ASA 8.x?

What are QEMU and IOU devices in GNS3? What does Jeremy (GNS3 Creator) recommend we use? Does QEMU only support VIRL? Or are other vendors supported? What about ASA 8.x? Is that supported? #gns3 #virl #iou

30 Aug 20197min

#74:  Will Dynamips and VPCS be removed from GNS3?

#74: Will Dynamips and VPCS be removed from GNS3?

David Bombal talks to Jeremy Grossmann (creator of GNS3) about the future of GNS3. Here we discuss Dynamips and VPCS and their future in GNS3. Will they be removed from GNS3? Are they recommended? What do they actually do? What should be used instead of them? Does Dynamips support switching? In future videos we will discuss additional options in gns3 such as Cisco VIRL and IOU. Menu: 0:12 - Devices in GNS3. It can be confusing. What is Dynamips 0:57 - Does GNS3 support switching? 1:17 - Are they real IOS images? 1:47 - Issue 1: Where do I get Cisco images? Cisco restrictions. 2:07 - Issues 2: Only older versions of Cisco IOS are supported on a lot of platforms 2:11 - Is it stable? Issue 3: More memory and processor intensive 2:25 - What is Idle PC Value 4:23 - Advantage 1: Supports serial interfaces 4:50 - Dynamips is a dying product 5:00 - You can run Dynamips locally 5:40 - What does Jeremy recommend we use? 5:50 - Switching in Dynamips? 7:18 - Will Dynamips be removed from GNS3? 7:48 - What is VPCS? 8:28 - What is the advantage of VPCS? 8:55 - Should we be using VPCS? 9:58 - Will VPCS be removed from GNS3? David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #gns3 #dynamips #virl

26 Aug 201911min

#73:  Wireshark Tutorial - Profiles and Password captures

#73: Wireshark Tutorial - Profiles and Password captures

In this Wireshark Tutorial, I demonstrate show you how to leverage Wireshark Profiles to sniff traffic and capture passwords and better utilize the Wireshark interface. Save time! Get my full Wireshark Course for $10 here on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb 🔬Download the Wireshark pcagng file here and follow along: http://bit.ly/WiresharkProfiles 🔥🔥Wireshark Course 🔥🔥 Full Wireshark Course for $10 on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #wireshark #wiresharktutorial #wiresharksniffing

22 Aug 20199min

#72: Wireshark Tutorial - Installation and Password sniffing

#72: Wireshark Tutorial - Installation and Password sniffing

In this Wireshark Tutorial, I demonstrate how to install Wireshark and then capturing packets with Wireshark. Get my full Wireshark Course for $10 here on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb I analyze Telnet and HTTP in this video. In other videos and in my course I'll show you how to capture passwords from FTP and other protocols. You can find Wireshark at: http://wireshark.org My Wireshark Ethical Hacking course: http://bit.ly/2IXZnn8 #wireshark #ethicalhacking #wiresharktutorial

19 Aug 201911min

#71:  Visio Alternative? GNS3 interactive topology diagrams

#71: Visio Alternative? GNS3 interactive topology diagrams

Is this a replacement for Visio? GNS3 now allows you to create interactive topology diagrams. You can create topologies consisting of both physical and virtual devices and get them to communicate with each other. Will gns3 replace visio? How will you make the most use of this new feature in gns3? #gns3 #visio #ccna

15 Aug 201912min

Populärt inom Teknik

uppgang-och-fall
elbilsveckan
rss-racevecka
market-makers
skogsforum-podcast
rss-elektrikerpodden
bilar-med-sladd
bosse-bildoktorn-och-hasse-p
natets-morka-sida
rss-laddstationen-med-elbilen-i-sverige
bli-saker-podden
rss-uppgang-och-fall
rss-veckans-ai
har-vi-akt-till-mars-an
rss-technokratin
solcellskollens-podcast
developers-mer-an-bara-kod
mediepodden
teknikveckan
rss-fabriken-2