Mastering Metasploit 5.0
3.9 (10 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
47 students enrolled

Mastering Metasploit 5.0

Perform penetration testing with Metasploit 5 framework in Kali Linux
3.9 (10 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
47 students enrolled
Created by Packt Publishing
Last updated 5/2019
English
English [Auto-generated]
Current price: $86.99 Original price: $124.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Dealing with exploits in Metasploit 5 framework.
  • Perform VAPT with Metasploit 5 Framework
  • Perform Privilege Escalation in Machines
  • Bypass Security Mechanisms in victim machines.
  • Learn the latest attacks with Metasploit 5
Requirements
  • To fully benefit from the coverage included in this course, you will need:Basic use of Kali Linux ● Basic Knowledge about Metasploit
  • This course has the following software requirements: ● Kali Linux, Windows10
Description

Metasploit 5 is a very popular exploitation framework and it is one of the largest exploit databases around. As a security researcher, it is important for you to know how a hacker might think and explore all the security holes so that it can be patched properly. In the course, we will look in-depth on steps to find loopholes and exploit vulnerable systems.

This course will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities. You will work with Metasploit architecture and work on real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, you will go on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. You will also cover the multiple new features introduced in Metasploit 5 and how it benefits your usage of Metasploit. Metasploit 5 now also supports Go, Python and Ruby module languages, which can prove useful.

By the end of the course, you will be able to implement time-saving techniques using Metasploit 5 and gain the skills to carry out penetration testing in complex and highly-secured environments.

About the Author

Sunil Gupta

He is a Cyber Security Specialist.

Currently, he is teaching online 50000+ students in 170+ countries. He is a specialist in Ethical Hacking Area.

Strengths:

  • Vulnerability Assessment

  • Penetration Testing

  • Bug Bounty Hunting

  • Intrusion Detection

  • Risk's Identification

  • Data Analysis

  • Report and Briefing

Who this course is for:
  • This course is for developers who want to learn advanced techniques of penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore the approaches to carry out advanced penetration testing in highly secured environments.
Course content
Expand all 44 lectures 04:42:34
+ Network Scanning
5 lectures 42:15

This video will give you an overview about the course.

Preview 02:08

In this video, you will get information about network scanners and network scanning process.

  • Learn about Metasploit scanner

  • Explore the lab scenario

  • Get explanation of the scanning process

Preview 02:17

In this video, you will perform port scanning using Nmap in Metasploit.

  • Learn about Nmap

  • Explore various Nmap commands

  • Get explanation of Nmap commands

Preview 08:39

In this video, you will perform network scanning using OpenVAS

  • Setup OpenVAS

  • Explore Metasploit and OpenVAS connection

  • Perform network scanning using OpenVAS and Metasploit

OpenVAS Scanning
15:01

This video will help you understand about scanning process using Nessus.

  • Learn about Nessus

  • Explore Nessus setup

  • Understand the scanning commands

Nessus Scanning
14:10
+ Exploitation Techniques
4 lectures 19:45

In this video, we will understand the exploitation process.

  • Learn about exploitation

  • Explore the lab scenario

  • Understand the exploitation process

Preview 02:21

This video will help you generate payload using Metasploit.

  • Learn about payload

  • Explore the Payload Generation command

  • Get explanation of command

Payload Generation
05:26

In this video, we will learn about unauthorized attack in the victim machine.

  • Learn about attack

  • Transfer payload in victim machine

  • Get access using Metasploit

Get Access in Victim’s Machine
04:19

In the video, we will learn about Meterpreter commands.

  • Learn about Meterpreter session

  • Get Meterpreter session

  • Explore the Meterpreter commands and explanation

Meterpreter
07:39
+ Security Bypass Frameworks
4 lectures 31:33

This video will help you learn about security bypass frameworks.

  • Learn about frameworks

  • Explore the list of frameworks

  • Get explanation of security bypass process

Preview 02:41

In this video, we will learn about Zirikatu framework.

  • Learn about Zirikatu framework

  • Understand the installation process of Zirikatu framework

  • Explore security bypass using Zirikatu

Zirikatu Framework
09:21

In this video, we will learn FatRat framework and security bypass process.

  • Learn about FatRat framework

  • Understand the installation process of FatRat

  • Explore bypass security using FatRat

FatRat Framework
09:18

In this video, we will learn about Veil Framework and security bypass process.

  • Learn about Veil Master framework

  • Understand the installation process of Veil

  • Explore bypass security using Veil

Veil Master Framework
10:13
+ Post Exploitation Techniques
4 lectures 16:46

In this video, we will learn post exploitation process.

  • Learn about post exploitation

  • Explore the goals of post exploitation

  • Understand the post exploitation process

Post Exploitation Process
02:17

We want to learn the privilege escalation process.

  • About privilege escalation

  • Privilege escalation exploits

  • Perform privilege escalation

Privilege Escalation
03:54

In this video, we will learn how to capture hashes from victim machine.

  • Learn about hash capturing process

  • Explore the hash capturing exploits

  • Gather hashes from victim machine

Capture Hashes
05:15

In this video, we will learn about packet sniffing in network.

  • Learn about sniffing

  • Understand the concept of sniffing auxiliary

  • Capture packets

Packet Sniffing
05:20
+ Metasploit Extended Usage
4 lectures 30:56

In this video, we will learn about Mimikatz commands (Part 1).

  • Learn about Mimikatz tool

  • Explore the Mimikatz commands

  • Explanation of Mimikatz commands

Mimikatz Commands (Part One)
08:47

In this video, we will learn about Mimikatz commands (Part 2).

  • Explore various Mimikatz commands

  • Gather information about system hashes

  • Gather information about processes running in the target system

Mimikatz Commands (Part Two)
05:39

In this video, we will learn about file upload backdoor in web server.

  • Learn about file upload backdoor

  • Generate a backdoor

  • Upload backdoor in web server

File Upload Backdoors
07:41

In this video, we will learn how to merge backdoor with .exe files.

  • Generate a backdoor

  • Merge backdoor and .exe file

  • Attack on the victim machine

Backdooring Exe Files
08:49
+ Maintaining Access
4 lectures 20:56

In this video, we will know about maintain access process.

  • Learn about maintaining access

  • Explore lab scenario

  • Get an explanation of the process

Maintain Access Process
02:12

In this video, we will know about Keylogging process.

  • Learn about Keylogging process

  • Insert Keylogger in the victim machine

  • Get keystrokes of the victim machine

Keylogging
06:08

In this video, we will learn about Meterpreter backdoor.

  • Perform privilege escalation

  • Use Metsvc backdoor

  • Get access in the victim machine

Meterpreter Backdoor
06:24

In this video, we will establish persistent session.

  • Learn about the persistent session

  • Understand persistent session commands

  • Get persistent session

Establish Persistent Session
06:12
+ Web Application Scanning
4 lectures 24:10

In this video, we will know about WMAP scanner.

  • Learn about WMAP scanner

  • Explore the goals of web scanners

  • Explore the process of web scanning

WMAP Web Scanner
02:31

In this video, we will setup WMAP in Metasploit.

  • Start services in Kali Linux

  • Initialize database

  • Load WMAP in Metasploit

Setup WMAP in Metasploit
02:49

In this video, we will learn about various WMAP commands.

  • Setup web target

  • Explore WMAP commands

  • Perform web scanning using WMAP

Setup Web Target
08:54

In this video, we will use web vulnerability scanning tool.

  • Learn about web scanning tool

  • Launch scanning tool using Metasploit

  • Perform web vulnerability testing

Web Vulnerability Testing
09:56
+ Client Side Attack – Social Engineering Attack
4 lectures 25:26

In this video, we will know about social engineering attack.

  • Learn about the social engineering attack

  • Explore the lab scenario

  • Explore various social engineering attacks

Social Engineering Attack
02:44

In this video, we will perform a phishing attack.

  • Learn about the phishing attack

  • Create phishing pages

  • Gather sensitive credentials

Phishing Attack
08:10

In this video, we will learn about mass mailer attack.

  • Learn about the mass mailer attack

  • Setup target

  • Perform the mail attack

Mass Mailer Attack
07:02

In this video, we will use payload and listener in SET.

  • Learn about payload and listener

  • Generate payload and transfer in the victim machine

  • Attack on the victim machine

Injecting Backdoor
07:30
+ Metasploit Auxiliary Modules
6 lectures 39:48

In this video, we will perform DOS attack using auxiliary in Metasploit.

  • Learn about DOS attack

  • Explore DOS auxiliary

  • Perform DOS attack

DOS Attack
07:14

In this video, we will perform password sniffing using auxiliary in Metasploit.

  • Learn about password sniffing

  • Understand sniffing auxiliary

  • Perform password sniffing

Password Sniffing
05:56

In this video, we will perform FTP Brute Force attack using auxiliary in Metasploit.

  • Learn about Brute Force attack

  • Understand Brute Force auxiliary

  • Perform FTP Brute Force attack

Auxiliary – FTP Brute Force Attack
08:57

In this video, we will perform port scanning using auxiliary in Metasploit.

  • Learn about port scanning

  • Explore port scanning auxiliary

  • Perform port scanning

Auxiliary – TCP Port Scanning
06:39

In this video, we will perform web crawling using auxiliary in Metasploit.

  • Learn about web crawling

  • Understand web crawling auxiliary

  • Perform web crawling

Auxiliary – Web Crawler
06:18

In this video, we will perform email harvesting using auxiliary in Metasploit.

  • Learn about email harvesting

  • Explore email harvesting auxiliary

  • Perform email harvesting

Auxiliary – Email Harvesting
04:44
+ Metasploit GUI
5 lectures 30:59

In this video, we will learn about Armitage (Metasploit GUI).

  • Learn about Armitage

  • Make the use of Armitage

  • Explore Armitage components

Armitage
02:52

In this video, we will launch Armitage in Kali Linux.

  • Start services in Kali Linux

  • Launch Armitage

  • Get basic information about Armitage

Initiate Armitage
04:08

In this video, we will perform scanning using Armitage.

  • Learn about scanning using Armitage

  • Explore various Nmap commands

  • Perform port scanning

Armitage Scanning
05:24

In this video, we will perform exploitation in the victim machine.

  • Learn about exploitation using Armitage

  • Generate a payload using Armitage and transfer it to the victim machine

  • Get Meterpreter session in Armitage

Armitage Exploitation
12:44

In this video, we will perform post exploitation using Armitage.

  • Learn about post exploitation using Armitage

  • Use exploits in Armitage

  • Perform hash attack

Armitage Post Exploitation
05:51