

Using these videos you can easily learn how to use metasploit. Here you will all the available video tutorial for metasploit. To know how to use metasploit, visit this link. This you can achieve using Metasploit software. This is phase-3 known as Gaining Access on remote system. The next step is to get access on system using the vulnerabilities found.To know these underground SQL tips n tricks visit this link& This Link You can also use few more SQL tools, softwares and techniques. After all these scanning, play with SQL.It will used to check the web server(s) for mis-configurations and exploitable web applications. To visit NESSUS video tutorials available on internet visit this link. If you want to working of NESSUS.OR How to use NESSUS visit this link. To know how NESSUS works visit this link. To see if you are running any services that are mis-configured or vulnerable to exploits. This will confirm listening services and check those against a database of exploitable services. These tools will scan all open ports, regardless of common and defaulted settings. For this you have to use NESSUS or OPEN VAS. The third step is Scanning target to find the vulnerabilities.To know how to perform Enumeration and footprinting attack, visit this link. Here you have to use Nmap to determine what services are open and available for manual testing. This is phase-1 and known as Reconnaissance. Do a manual review of the target system or server to get an overview of the target.
