Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Online Business Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Ethical Hacking with Metasploit: Exploit & Post Exploit

Learn Ethical Hacking from scratch with Metasploit , exploit vulnerabilities and become a white hat hacker
Highest Rated
Rating: 4.8 out of 54.8 (503 ratings)
5,179 students
Created by Muharrem AYDIN
Last updated 4/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • You will become an expert in using Metasploit for ethical hacking and network security.
  • Set up a lab environment to practice hacking
  • Install Kali Linux - a penetration testing operating system
  • Install Windows & vulnerable operating systems as virtual machines for testing
  • Learn Linux commands and how to interact with the terminal
  • Discover vulnerable applications
  • Vulnerability scanning, Exploit, Post Exploit, Payload
  • Gain control over computer systems using server side attacks
  • Exploit vulnerabilities to gain control over systems
  • Gathering password hashes, cracking passwords, taking screenshots, logging keystrokes etc.
  • Using backdoors to persist on the victim machine
  • The very latest up-to-date information and methods
  • During the course you will learn both the theory and how to step by step setup each method
  • Social Engineering Toolkit (SET) for Phishing
Curated for the Udemy for Business collection

Requirements

  • 8 GB (Gigabytes) of RAM or higher (16 GB recommended)
  • 64-bit system processor is mandatory
  • 20 GB or more disk space
  • Enable virtualization technology on BIOS settings, such as “Intel-VTx”
  • Modern Browsers like Google Chrome (latest), Mozilla Firefox (latest), Microsoft Edge (latest)
  • All items referenced in this course are Free
  • A computer for installing all the free software and tools needed to practice
  • A strong desire to understand hacker tools and techniques
  • Be able to download and install all the free software and tools needed to practice
  • A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  • Nothing else! It’s just you, your computer and your ambition to get started today

Description

Hi there,

Welcome to my “Ethical Hacking with Metasploit: Exploit & Post Exploit” course.

This course is a monster!!!

It covers the fundamental building blocks of hacking, penetration testing (Kali Linux), gaining control using Metasploit and application development.

Do not worry. You don’t need to have a previous knowledge about all. This course will take you from a beginner to a more advanced level.

Good news is since free and popular tools are used you don’t need to buy any tool or application.

All my students will have a chance to learn how to set up a lab environment and install the needed virtual machines such as Kali Linux and the tools: Nessus and Metasploit.

This course starts with very basics. First you will learn how to install the the tools, some terminology and how devices communicate with each other. Then you will learn how to scan vulnerabilities with Nessus and gain full access to computer systems via discovering the weaknesses and vulnerabilities.

In this course you'll also become an expert with Metasploit framework by using msfconsole interface. After learning Metasploit by practicing against victim machines you will be able to exploit and remotely access to Linux and Windows victim machines and gain control and access files (read/write/update/execute).

You will not only learn compromising the target systems via vulnerabilities but also Pass the Hash: a genuine way to exploit systems even though they don’t have any vulnerability.

In this course you will also learn different password collection techniques such as using keylogger, and learn how to crack password hashes using brute force and dictionary attack techniques.

All the attacks in this course are explained in a simple way and with hands-on practices. First you will learn the theory behind each attack and then you will learn how to carry out the attack using tools. I’m always updating this course with fresh content, too. It’s no secret how technology is advancing at a rapid rate. New tools are released every day, and it’s crucial to stay on top of the latest knowledge for being a better security specialist. You will always have up-to-date content to this course at no extra charge. After buying this course, you’ll have lifetime access to it and any future updates.

Any question are welcomed! I’ll personally answer all your questions.

Be sure that I will always be here for full support as I did before. You can see this in my previous course's reviews.

“This course is just wow ! It hold a lot of information and practical use in real life. In my opinion, students who is interested in ETHICAL HACKING must take this course it hold a lot of information, Don't go with duration of course. Instructor is also very supportive and give you quick answer of all your question. Thank you for making this course for us. This course really expand my knowledge and i really enjoyed it.” - Prabhakar Mishra

 "Easy teaching, no unnecessary statements. Just telling what is needed... An effective real introduction to pentest." - Ben Dursun

"Very good experience, I always wanted such type of training which is filled with deep explanation and demo. I am interested in the security field and want to make my career in this domain, I really enjoy the learning." - Pragya Nidhi

 Here is the list of  what you’ll learn by the end of course,

  • Preparation for Hands-on experiences: Kali, Metasploitable Linux, Windows XP, Windows 8
  • Vulnerability Scanning: How to find vulnerabilities to exploit
  • Concept & Terminology: Vulnerability, Exploit, Post Exploit, Payload
  • Risks: Risks of the exploitation and mitigations
  • Exploit Databases: Exploit-DB, Packet Storm
  • Metasploit: Metasploit Framework, Msfconsole, Meterpreter
  • Pass the Hash: Ps-Exec
  • Persistence: Backdoor, service modification, creating account
  • Meterpreter Extensions: Core, Stdapi, Incognito,  
  • MSF Post Exploitation Modules: Escalate, Gather , Manage
  • Password Cracking: Hydra, Cain & Abel, John the Ripper  
  • Shared Files and End User Computers: With some real world examples

 IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.



Who this course is for:

  • Anyone who wants to learn how to find vulnerabilities to exploit
  • Anyone who wants to learn the tools to exploit vulnerabilities,
  • Anyone who wants to learn Metasploit as exploitation and post exploitation tool
  • Anyone who wants to learn "Pass the hash" method to compromise a Windows system with no vulnerability
  • Anyone who wants to learn post exploitation using Metasploit Framework
  • Anyone who wants to learn how to crack password hashes
  • Anyone who wants to learn how to collect sensitive data from end user systems
  • People who are willing to make a career in Cyber Security
  • Anyone who wants to be a White Hat Hacker

Course content

13 sections • 87 lectures • 5h 17m total length

  • Preview00:59

  • Preview01:29
  • Enabling Virtualization (VT-x or AMD-V) in BIOS
    00:42
  • Lab's Architecture Diagram
    01:25
  • Using VirtualBox vs VMware
    00:16
  • Install & Run Oracle VM VirtualBox
    04:53
  • Installing Kali using the VMware Image - Step 1
    03:13
  • Installing Kali using the VMware Image - Step 2
    Preview04:47
  • Installing Kali using the VMware Image - Step 3
    04:30
  • Installing Kali using the ISO file for VMware - Step 1
    01:26
  • Installing Kali using the ISO file for VMware - Step 2
    06:48
  • Installing Kali using the ISO file for VMware - Step 3
    02:41
  • Installing Kali on VirtualBox using the OVA file - Step 1
    03:14
  • Installing Kali on VirtualBox using the OVA file - Step 2
    06:44
  • Installing Kali on VirtualBox using the OVA file - Step 3
    04:11
  • Installing Kali using the ISO file for VirtualBox - Step 1
    02:49
  • Installing Kali using the ISO file for VirtualBox - Step 2
    06:49
  • Installing Kali using the ISO file for VirtualBox - Step 3
    04:23
  • Installing Metasploitable
    Preview04:11
  • Free Windows Operating Systems on VMware Fusion
    05:54
  • Free Windows Operating Systems on Oracle VM VirtualBox
    02:55
  • Windows Systems as Victim
    00:59
  • Configuring NAT Network in Oracle VM VirtualBox
    01:07
  • Checking Lab Network Connectivity
    02:58

  • Introduction to Vulnerability Scanning
    02:10
  • Nessus® Home vs Nessus® Essentials
    00:52
  • Downloading Nessus
    01:40
  • Installing Nessus
    03:41
  • Preview04:24
  • Aggressive Scan with Nessus: Results
    07:17
  • Aggressive Scan with Nessus: Results with Windows Targets
    02:45

  • Concept and The Terminology
    06:13
  • Exploit Databases
    01:56
  • Manuel Exploitation
    05:50
  • Exploitation Frameworks
    03:36

  • Introduction to MSF
    01:22
  • Metasploit Framework
    05:01
  • Msfconsole
    02:13
  • Msfconsole Initialisation
    02:16
  • Msfconsole Exploit Search & Ranking
    03:37
  • Running Msfconsole
    08:14
  • Meterpreter
    00:54
  • Running Meterpreter
    02:12
  • Meterpreter on a Linux System - Basics
    08:36
  • Preview05:51

  • Pass the Hash
    04:00
  • Pass the Hash: Metasploit PsExec
    03:49
  • Exploit A Machine and Gather Password Hashes
    Preview02:15
  • Pass The Hash: Try Hashes on The Other Systems
    10:25

  • Post-Exploitation
    03:28
  • What is “Persistence”
    01:28
  • Meterpreter’s Persistence module
    08:55
  • Removing the Backdoor
    01:08
  • Running Meterpreter’s Persistence Module on Windows 8
    02:56
  • Preview04:41
  • Next Generation Persistence: Step 2
    04:32

  • Meterpreter for Post - Exploitation
    01:37
  • Meterpreter Core Commands
    01:45
  • Meterpreter Core Extension - Session Command
    02:31
  • Meterpreter Core Extension - Migrate Command
    03:34
  • Meterpreter Core Extension - Channel Command
    02:43
  • Meterpreter Stdapi Extension
    01:05
  • Meterpreter Stdapi Extension - File System Commands
    05:19
  • Preview04:13
  • Meterpreter Stdapi Extension - User Interface & Webcam Commands
    04:08

  • Meterpreter Incognito Extension
    03:26
  • Preview03:53
  • Metasploit Post-Exploitation Modules
    02:01
  • Gathering Modules
    01:21
  • Managing Modules
    06:51

  • Password Cracking
    03:06
  • Preview03:30
  • Linux Hashes
    02:33
  • Password Cracking Classification
    02:11

Instructor

Muharrem AYDIN
Computer Engineer, Cyber Security Expert, IT Lawyer
Muharrem AYDIN
  • 4.4 Instructor Rating
  • 7,775 Reviews
  • 48,673 Students
  • 23 Courses

After 20+ years of software engineering experience with titles of software developer, product manager, and integration architect, I have been working in cyber security domain for last 15 years. I am not only a cyber security expert but also the head and kick-starter of a cyber security consultancy unit. 

In security field, I have performed dozens of penetration tests for institutes from different sectors: finance, military, state agencies, and telcos.

I have been consulting different companies in security field which includes global banks such as ING Bank, HSBC, CitiBank and more.

In addition, I am an adjunct instructor in a university and teaching cyber security for years.

I involved in technical areas and has taken responsibilities in: 

Penetration tests (Pentests) and security audits

Cyber security training & consultancy

Source code analysis & secure software development

Cyber security incident response

Information security management system (ISMS) consultancy 

Open source cyber security systems, such as OpenVAS, OSSEC, OSSIM, Snort, Suricata, mod security

I'm creating my courses by using my know-how and 10 years of experience. As a result, our first course "Hacking Web Applications and Penetration Testing: Fast Start!" has gained "Best Seller" reputation in its category. 

I have risen a lot of cyber security experts from scratch, and you are the next.


  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.