Penetration Testing with Metasploit & Analyzing the IDS logs

Learn to conduct PenTesting / White Hacking using Metasploit plus Analyzing the Intrusion Detection System (IDS) events
4.2 (13 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
2,109 students enrolled
$19
$30
37% off
Take This Course
  • Lectures 28
  • Length 1.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2016 English

Course Description

Update 1 [Oct 24 2016]: New Lecture : Intrusion Detection System (IDS) Evasion while Shellshock Exploit.

Update 2 [Nov 15  2016]: New Article : Wireshark Analysis for the Exploit Packet while IDS Evasion

-----------------------------------

This course will teach you to how to perform Penetration Testing / Hacking using Metasploit, the world most popular and powerful exploiting framework.

Also we'll check and analyze the events of the Intrusion Detection System (IDS) in case we are conducting exploit sessions and the reconnaissance scans.

The course will teach you step-by-step how to gather information, exploit, control your target/victim and clear your traces.

The course material is presented in a practical Real-life demos that will let you have hands-on the principles and techniques that will assist you to be a successful security professional, penetration-tester or any other career path related to the IT Security.

By the end of this course you’ll be able to perform Network Security Audits / Penetration Testing efficiently using Metasploit Framework.

This course will develop and empower your Information Security knowledge and thus will take your career path to a higher step.

Why this course is Special ?!

  • There is some lectures where i present the IDS (Intrusion Detection System) events capturing the attack / reconnaissance conducted in the presented demos.
  • 95% of the Course Content is practical Real-life scenario demos.
  • The Course is updated from time-to-time with new videos and lessons.

After enrolling now you'll have a lifetime access to the current published lectures and the future one also.

Coming Soon Lectures :

  • Intrusion Detection System (IDS) Evasion while Shellshock Exploit. (Done - Oct 24 2016)
  • Wireshark Analysis for the Exploit Packet while IDS Evasion. (Done - Nov 15  2016)
  • Analyzing the Exploit and Reconnaissance captured packets using Wireshark
  • OpenVAS integration with Metasploit
  • Hail Mary attack in Armitage

What are the requirements?

  • Network basic knowledge
  • General IT Knowledge
  • No programming skills needed
  • Good to have (not a must) Linux/*nix basics

What am I going to get from this course?

  • Have a hands-on the most powerful exploiting framework Metasploit
  • Perform reconnaissance to gather information about your target/victim
  • Perform a penetration Testing / hacking and exploit vulnerabilities
  • Conduct a real life attacks on virtual machines to test your pentesting abilities using metasploit.
  • Get exposed to Intrusion Detection System (IDS) events in case of exploitation or reconnaissance sessions.

What is the target audience?

  • Information Security beginners and professionals
  • Information Security Officers
  • Information Security Auditors
  • Penetration testers
  • IT supervisors and managers
  • IT beginners and specialists
  • Network Administrators

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Welcome
01:58

In this welcome message, I mentioned briefly the Course Goals and Headlines and for whom it was designed for.

Section 2: Introduction
00:41

Headlines of the Introduction section.

01:17

In this video we'll briefly discuss the meaning of the Vulnerabilities and how it is considered a weakness point in the systems..

01:37

In this video we'll learn what is an Exploit and a Payload , The Exploit is a common definition in the Information Security and Hackers World but the Payload as i'll see in this Lecture is a quite related definition to Metasploit framework.

01:46

A brief introduction about Metasploit and it's features, it's history and development.

The Intro Quiz
1 question
Section 3: Metasploit Basics
03:19

A brief introduction about MSFConsole - the most powerful and stable Metasploit interface type.

04:15

We'll learn in this video about the Msfcli (and Msfconsol -X for new versions) with a quick demo on how to exploit a target using Msfcli.

00:50

A brief word about a nice GUI front-end for Metasploit framework which is called Armitage. More details about Armitage is explained in a further section.

The Basic Section Quiz
1 question
Section 4: Reconnaissance and Information gathering phase
03:57

This video is providing an intro about NMAP and some scanning options.

Article

A list consolidating all the NMAP scan types and options in a single page.

02:50

Checking and Analyzing the IDS (Intrusion Detection System) events in case of conducting a Reconnaissance scans.

03:10

In this video we'll learn how to store the nmap scan result automatically in the Metasploit database.

03:13

In this video we'll learn how to import a reconnaissance scan result into Metasploit database, this command can import from dozens of tools and frameworks but in this video w'll just provide a single example.

04:47

In this video we'll give a brief intro about Nessus then describe how to download and install it

08:34

In this video we'll learn how to conduct a new scan and we'll go through the scan results to find more info about the target and the vulnerabilities impact that host and how to use that assessment if you need to fix and patch those vulnerabilities or in case you want to perform a pen-testing by exploiting those vulnerabilities.

06:45

In this video we'll learn how to create and tune a new scan policy based on our network and environment. 

Reconnaissance and Information gathering Quiz
1 question
Section 5: Exploitation Phase
03:29

in this video we'll learn how to search for and exploit using the msfconsol. 

w'll start with general search then gradually will tight and filter the search more till we find the most suitable exploit to conduct our attack.

08:52

this video describes the exploitation phase and how to conduct a full attack on a Linux Ubuntu victim through exploiting a Bash Shellshock vulnerability.

05:15

this video describes the exploitation phase and how to conduct a full attack on a windows victim through exploiting a critical Microsoft SMB vulnerability.

03:02

A very interesting video presenting the IDS (Intrusion Detection System) events while a exploiting a Shellshock vulnerability.

Exploitation Quiz
1 question
Section 6: Post Exploitation Phase
03:34

In this video we'll learn the below actions that can perform in the victim's machine:

  • how to display some basic info about the victim.
  • how to display the NICs installed in the victim and the IP addresses assigned to them.
  • how to list files and folders and change directories
  • how to download/upload files from/to the victim.
  • display the idle time of user using the console access of the victim.
04:04

In this video we'll learn the below actions that can perform in the victim's machine:

  • how to list the running process, get the user ID / process ID that Meterpreter using to run in the victim
  • how to migrate the Meterpreter session to another process.
  • how to get the password hashs of the usernames configured on the victim.
  • how to capture a screenshot to the victim's desktop.
02:51

In this video we'll learn how to clear your traces in a windows victim by wiping all the even logs using Meterpreter.

Post Exploitation Quiz
1 question
Section 7: Armitage
01:45

in this video we'll take a quick intro and description about Armitage.

03:38

in this video you'll learn how to add targets to Armitage and how to perform reconnaissance and host discovery scans on them.

05:10

in this video w'll learn how to exploit and compromise a victim easily using just a few clicks then gain a meterpreter session to play and control our victim.

Armitage Quiz
1 question
Section 8: Intrusion Detection System (IDS) Evasion
02:21

Evading the Mcafee Intrusion Detection System (IDS) while exploiting the critical Bash Shellshock vulnerability by send the malicious bash command in a random invalid http request and thus the attack was not recognized by the IDS.

Article

Wireshark exploit packet analysis in case of No Evasion and also in case of Success Evasion to Mcafee (Intel Security) Intrusion Detection System (IDS)

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Ismail Eltahawy, Information Security Specialist

Security Solution Expert at Orange Business Services with over 8 years experience in Information Security.

ُHave experience in Defensive and Offensive Security, Penetration Testing, IPS/IDS evasion techniques, Linux, Computer Networking, Firewalls, WAF, Web-filtering, Next Generation Firewalls, SIEM systems and more. 

My Job rules in the Information security Field Include:

- Design and develop new cloud security solutions based on vendor products (Intrusion Prevention, SIEM and Deep Inspection Firewalls)

- Design and develop new Security Solutions for the IPS/IDS and SIEM services

- Perform systems integration across multiple platforms (Linux, Unix, Raspberry Pi, Windows, IPSs, Threat Analyzers, HP Arcsight, Zscaler)

- Provide operations teams with the appropriate documentation and training and lead them during the rollout and deployment

- Design and test complex customer security solutions and architectures

- Certificates i have:
   Certified Information Systems Security Professional (CISSP)
   Certified Ethical Hacker (CEH v7)
   GIAC Certified Incident Handler (GCIH)
   GIAC Security Essentials Certification (GSEC)
   Juniper Networks Certified Internet Specialist (JNCIS-Sec)
   Juniper Networks Certified Internet Associate (JNCIA-Junos)
   Cisco Certified Network Associate Security (CCNA Security)    
   Cisco Certified Network Professional (CCNP)
   Cisco Certified Network Association (CCNA)




Ready to start learning?
Take This Course