http://www.vulnerabilityassessment.co.uk/meterpreterswf.html
http://www.vulnerabilityassessment.co.uk/msfcliswf.html
http://www.vulnerabilityassessment.co.uk/win32_execswf.html
http://www.vulnerabilityassessment.co.uk/1stmetasploit.html
http://www.vulnerabilityassessment.co.uk/win32_bin_stg_upexecswf.html
http://learnsecurityonline.com/vid/MSF3-met/MSF3-met.html
http://learnsecurityonline.com/vid/MSF3-nc-reg-hack/MSF3-nc-reg-hack.html
http://learnsecurityonline.com/vid/MSF3-VNC/MSF3-VNC.html
http://learnsecurityonline.com/vid/MSF3_web/msfwebp1.html
http://learnsecurityonline.com/vid/MSF3_web/msfwebp2.html
http://www.milw0rm.com/video/watch.php?id=67
http://www.milw0rm.com/video/watch.php?id=5 0
http://www.milw0rm.com/video/watch.php?id=5
http://www.determina.com/security.research/flash/ani.html
http://www.ethicalhacker.net/content/view/227/24/
http://www.ethicalhacker.net/content/view/238/24/
http://www.ethicalhacker.net/content/view/137/24/
http://www.ethicalhacker.net/content/view/136/24/
http://www.vimeo.com/videos/search:metasploit
http://guides.intern0t.net/msf1.php
http://guides.intern0t.net/msf2.php
http://www.computerdefense.org/wp-content/uploads/manual/msf25.avi
http://www.computerdefense.org/wp-content/uploads/manual/msf30.avi
http://www.irongeek.com/i.php?page=videos/metasploit1
http://www.vulnerabilityassessment.co.uk/msfcliswf.html
http://www.vulnerabilityassessment.co.uk/win32_execswf.html
http://www.vulnerabilityassessment.co.uk/1stmetasploit.html
http://www.vulnerabilityassessment.co.uk/win32_bin_stg_upexecswf.html
http://learnsecurityonline.com/vid/MSF3-met/MSF3-met.html
http://learnsecurityonline.com/vid/MSF3-nc-reg-hack/MSF3-nc-reg-hack.html
http://learnsecurityonline.com/vid/MSF3-VNC/MSF3-VNC.html
http://learnsecurityonline.com/vid/MSF3_web/msfwebp1.html
http://learnsecurityonline.com/vid/MSF3_web/msfwebp2.html
http://www.milw0rm.com/video/watch.php?id=67
http://www.milw0rm.com/video/watch.php?id=5 0
http://www.milw0rm.com/video/watch.php?id=5
http://www.determina.com/security.research/flash/ani.html
http://www.ethicalhacker.net/content/view/227/24/
http://www.ethicalhacker.net/content/view/238/24/
http://www.ethicalhacker.net/content/view/137/24/
http://www.ethicalhacker.net/content/view/136/24/
http://www.vimeo.com/videos/search:metasploit
http://guides.intern0t.net/msf1.php
http://guides.intern0t.net/msf2.php
http://www.computerdefense.org/wp-content/uploads/manual/msf25.avi
http://www.computerdefense.org/wp-content/uploads/manual/msf30.avi
http://www.irongeek.com/i.php?page=videos/metasploit1
http://www.irongeek.com/i.php?page=videos/metasploitwmf
本文转sinojelly51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/346142,如需转载请自行联系原作者