Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains ad-on tools, such as nmap, Armitage, and so on, that can further add more skill sets in your techniques for penetration testing. Overall the video series covers every nook and corner of Metasploit.
The "Expert Metasploit Penetration Testing" video series starts with the information-gathering phase and advances to complex topics that include the exploitation of targets using remote and client-side attacks, using meterpreter, pivoting, auxiliary modules, and much more. The final section of the series covers Armitage, a GUI-based tool, built over the Metasploit framework.
The video series starts with scanning for vulnerabilities in the target/network, building standalone payloads using msfencode, exploiting operating systems and then moves ahead with client-side exploitation techniques, the Auxiliary module, and so on. In the post-exploitation phase, it covers persistence, the meterpreter, and pivoting. The final section deals with Armitage and explains how it can be used to leverage the powers of Metasploit over a GUI interface.
"Expert Metasploit Penetration Testing" is a quick and comprehensive guide for people who are willing to learn by doing.
"Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real-time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains add-on tools, such as nmap, Armitage, and so on, that can add more penetration testing techniques to your skillset. Overall, the video series covers every aspect of Metasploit.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: GETTING STARTED WITH SCANNING - The first step to Pen-testing|
Scanning with NmapPreview
More Nmap Scan OptionsPreview
Working with a Database to Store Scan ResultsPreview
Scanning with Auxiliary ModulesPreview
Vulnerability Scanning with NeXposePreview
|Section 2: WORKING WITH METASPLOIT PAYLOADS AND ENCODERS|
Working with msfpayload
Working with msfencode
Generating Complex Payloads
Setting Up Metasploit Exploit Modules and Reverse Handlers
Penetration Testing Using an Executable and Reverse Handler
|Section 3: WORKING WITH EXPLOIT MODULES|
WinXP SP2 Vulnerability Assessment and Exploitation
Binding Shells and Changing Payloads
Understanding the Metasploit Directory Structure
Penetration Testing on a Linux Machine
|Section 4: CLIENT-SIDE EXPLOITATION USING METASPLOIT|
Client-side Exploitation Based on Internet ExplorerPreview
Exploitation Module Based on Adobe ReaderPreview
Exploitation and Pen-testing Based on a Java AppletPreview
Targeting the Microsoft File Format's Vulnerabilities for Penetration TestingPreview
|Section 5: POST-EXPLOITATION WITH METERPRETER|
Meterpreter System CommandsPreview
Privilege Escalation Using Meterpreter
Meterpreter File System Commands
Meterpreter User Interface Commands
|Section 6: ADVANCED METERPRETER|
Passing the Hash
Setting Up Persistent Connection Using Meterpreter
Meterpreter Networking Commands
|Section 7: WORKING WITH AUXILIARY MODULES|
Understanding the Module Directory Structure and Auxiliary Modules
Working with Admin Auxiliary Modules
Denial-of-service Auxiliary Modules
Fuzzer Auxiliary Modules
Post Exploitation Auxiliary Modules
|Section 8: WORKING WITH ARMITAGE|
Getting Started with Armitage
Scanning with Armitage
Launching Exploits against a Target Using Armitage
Post Exploitation Using Armitage
Abhinav Singh is a young information security specialist from India. He has a keen interest in the field of Information Security and has adopted it as his full time profession. His core work areas include Malware Analysis, Network Security, System and Enterprise Security. He is also the author of "Metasploit Penetration Testing Cookbook" and "Instant Wireshark" published by Packt. Abhinav's work has been quoted in several InfoSec magazines and portals.