Expert Metasploit Penetration Testing Series

Enhance your knowledge of penetration testing and exploitation using Metasploit
4.5 (22 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
283 students enrolled
$19
$20
5% off
Take This Course
  • Lectures 38
  • Length 2 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 12/2015 English

Course Description

Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains ad-on tools, such as nmap, Armitage, and so on, that can further add more skill sets in your techniques for penetration testing. Overall the video series covers every nook and corner of Metasploit.

The "Expert Metasploit Penetration Testing" video series starts with the information-gathering phase and advances to complex topics that include the exploitation of targets using remote and client-side attacks, using meterpreter, pivoting, auxiliary modules, and much more. The final section of the series covers Armitage, a GUI-based tool, built over the Metasploit framework.

The video series starts with scanning for vulnerabilities in the target/network, building standalone payloads using msfencode, exploiting operating systems and then moves ahead with client-side exploitation techniques, the Auxiliary module, and so on. In the post-exploitation phase, it covers persistence, the meterpreter, and pivoting. The final section deals with Armitage and explains how it can be used to leverage the powers of Metasploit over a GUI interface.

"Expert Metasploit Penetration Testing" is a quick and comprehensive guide for people who are willing to learn by doing.

"Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real-time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains add-on tools, such as nmap, Armitage, and so on, that can add more penetration testing techniques to your skillset. Overall, the video series covers every aspect of Metasploit.

What are the requirements?

  • basics of computers and virtual machines
  • basic knowledge of information security and its terminologies.
  • understanding of unix and windows operating systems.
  • Understanding of Ruby language(not mandatory).

What am I going to get from this course?

  • master the art of penetration testing using metasploit.
  • understand the concepts of attack and defence using msf console.
  • perform real-time attacks on virtual machines to test your pentesting abilities using metasploit.
  • Step-by-step demonstration of the Metasploit framework using real-time examples, diagrams, and presentations for theoretical topics
  • Covers all three phases of penetration testing in detail including additional tools, such as Armitage, Nmap, and Nessus

What is the target audience?

  • this course is for secuirty enthusiasts, pen-testers and system administrators.
  • The coruse starts with very basics of penetration testing, hence it is perfectly suitable for new learners of information security and penetration testing.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: GETTING STARTED WITH SCANNING - The first step to Pen-testing
Scanning with Nmap
Preview
03:36
More Nmap Scan Options
Preview
03:57
Working with a Database to Store Scan Results
Preview
03:15
Scanning with Auxiliary Modules
Preview
03:15
Vulnerability Scanning with NeXpose
Preview
03:18
Section 2: WORKING WITH METASPLOIT PAYLOADS AND ENCODERS
Working with msfpayload
03:18
Working with msfencode
02:39
Generating Complex Payloads
02:37
Setting Up Metasploit Exploit Modules and Reverse Handlers
01:53
Penetration Testing Using an Executable and Reverse Handler
02:11
Section 3: WORKING WITH EXPLOIT MODULES
WinXP SP2 Vulnerability Assessment and Exploitation
03:19
Binding Shells and Changing Payloads
01:49
Understanding the Metasploit Directory Structure
03:40
Penetration Testing on a Linux Machine
03:17
Section 4: CLIENT-SIDE EXPLOITATION USING METASPLOIT
Client-side Exploitation Based on Internet Explorer
Preview
02:37
Exploitation Module Based on Adobe Reader
Preview
02:54
Exploitation and Pen-testing Based on a Java Applet
Preview
02:11
Targeting the Microsoft File Format's Vulnerabilities for Penetration Testing
Preview
02:40
Browser Autopwn
Preview
02:37
Section 5: POST-EXPLOITATION WITH METERPRETER
Understanding Meterpreter
Preview
03:09
Meterpreter System Commands
Preview
02:44
Privilege Escalation Using Meterpreter
02:32
Meterpreter File System Commands
01:54
Meterpreter User Interface Commands
04:01
Section 6: ADVANCED METERPRETER
Passing the Hash
02:55
Setting Up Persistent Connection Using Meterpreter
02:59
Meterpreter Networking Commands
04:11
Pivoting
03:46
Railgun
02:35
Section 7: WORKING WITH AUXILIARY MODULES
Understanding the Module Directory Structure and Auxiliary Modules
03:12
Working with Admin Auxiliary Modules
02:58
Denial-of-service Auxiliary Modules
02:36
Fuzzer Auxiliary Modules
02:33
Post Exploitation Auxiliary Modules
02:22
Section 8: WORKING WITH ARMITAGE
Getting Started with Armitage
02:07
Scanning with Armitage
02:39
Launching Exploits against a Target Using Armitage
02:43
Post Exploitation Using Armitage
03:10

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Abhinav singh, Security researcher

Abhinav Singh is a young information security specialist from India. He has a keen interest in the field of Information Security and has adopted it as his full time profession. His core work areas include Malware Analysis, Network Security, System and Enterprise Security. He is also the author of "Metasploit Penetration Testing Cookbook" and "Instant Wireshark" published by Packt. Abhinav's work has been quoted in several InfoSec magazines and portals.

Ready to start learning?
Take This Course