Penetration Testing with Metasploit & Analyzing the IDS logs
4.2 (27 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,237 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Penetration Testing with Metasploit & Analyzing the IDS logs to your Wishlist.

Add to Wishlist

Penetration Testing with Metasploit & Analyzing the IDS logs

Learn to conduct PenTesting / White Hacking using Metasploit plus Analyzing the Intrusion Detection System (IDS) events
4.2 (27 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,237 students enrolled
Created by Ismail Eltahawy
Last updated 5/2017
English
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • 3 Articles
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Have a hands-on the most powerful exploiting framework Metasploit
  • Perform reconnaissance to gather information about your target/victim
  • Perform a penetration Testing / hacking and exploit vulnerabilities
  • Conduct a real life attacks on virtual machines to test your pentesting abilities using metasploit.
  • Get exposed to Intrusion Detection System (IDS) events in case of exploitation or reconnaissance sessions.
View Curriculum
Requirements
  • Network basic knowledge
  • General IT Knowledge
  • No programming skills needed
  • Good to have (not a must) Linux/*nix basics
Description

Update 1 [Oct 24 2016]: New Video Lecture : Intrusion Detection System (IDS) Evasion while Shellshock Exploit.

Update 2 [Nov 15  2016]: New Article : Wireshark Analysis for the Exploit Packet while IDS Evasion.

Update 3 [Dec 19  2016]: New Article : Fix done by the vendor for the IDS Evasion while Shellshock exploit.

Update 4 [Nov 15  2016]: New Video Lecture: Open Source IDS SNORT detecting the Bash Shellshock exploit. & brief explanation to the SNORT custom rule.

-----------------------------------

This course will teach you to how to perform Penetration Testing / Hacking using Metasploit, the world most popular and powerful exploiting framework.

Also we'll check and analyze the events of the Intrusion Detection System (IDS) in case we are conducting exploit sessions and the reconnaissance scans.

The course will teach you step-by-step how to gather information, exploit, control your target/victim and clear your traces.

The course material is presented in a practical Real-life demos that will let you have hands-on the principles and techniques that will assist you to be a successful security professional, penetration-tester or any other career path related to the IT Security.

By the end of this course you’ll be able to perform Network Security Audits / Penetration Testing efficiently using Metasploit Framework.

This course will develop and empower your Information Security knowledge and thus will take your career path to a higher step.

Why this course is Special ?!

  • There is some lectures where i present the IDS (Intrusion Detection System) events capturing the attacks and malware infections conducted in the presented demos.
  • 95% of the Course Content is practical Real-life scenario demos.
  • The Course is updated from time-to-time with new videos and lessons.

After enrolling now you'll have a lifetime access to the current published lectures and the future one also.

Coming Soon Lectures :

  • Intrusion Detection System (IDS) Evasion while Shellshock Exploit. (Done - Oct 24 2016)
  • Wireshark Analysis for the Exploit Packet while IDS Evasion. (Done - Nov 15  2016)
  • Fix done by the vendor for the IDS Evasion while Shellshock exploit (Done - Dec 19  2016)
  • Open Source IDS SNORT detecting Bash Shellshock exploit & brief explanation to the SNORT custom rule (Done - May 29, 2017)
  • WannaCry Ransomware in lab tests - McAfee IPS & SNORT IDS detection.
  • OpenVAS integration with Metasploit
  • Intro to IDS/IPS - detection mechanisms, deployment modes...etc
  • SNORT custom rules - detailed explanations
Who is the target audience?
  • Information Security beginners and professionals
  • Information Security Officers
  • Information Security Auditors
  • Penetration testers
  • IT supervisors and managers
  • IT beginners and specialists
  • Network Administrators
Curriculum For This Course
30 Lectures
01:39:27
+
Welcome
1 Lecture 01:58

In this welcome message, I mentioned briefly the Course Goals and Headlines and for whom it was designed for.

Preview 01:58
+
Introduction
4 Lectures 05:21

Headlines of the Introduction section.

The Introduction Headlines
00:41

In this video we'll briefly discuss the meaning of the Vulnerabilities and how it is considered a weakness point in the systems..

What is a Vulnerability ?
01:17

In this video we'll learn what is an Exploit and a Payload , The Exploit is a common definition in the Information Security and Hackers World but the Payload as i'll see in this Lecture is a quite related definition to Metasploit framework.

Preview 01:37

A brief introduction about Metasploit and it's features, it's history and development.

What is and why ... Metasploit ?
01:46

The Intro Quiz
1 question
+
Metasploit Basics
3 Lectures 08:24

A brief introduction about MSFConsole - the most powerful and stable Metasploit interface type.

Metasploit Interfaces - MSFConsole
03:19

We'll learn in this video about the Msfcli (and Msfconsol -X for new versions) with a quick demo on how to exploit a target using Msfcli.

Preview 04:15

A brief word about a nice GUI front-end for Metasploit framework which is called Armitage. More details about Armitage is explained in a further section.

Metasploit Interfaces - Armitage
00:50

The Basic Section Quiz
1 question
+
Reconnaissance and Information gathering phase
8 Lectures 36:31

This video is providing an intro about NMAP and some scanning options.

NMAP - Intro and different scanning options
03:57

A list consolidating all the NMAP scan types and options in a single page.

Scan Types and Options Summary for Nmap
03:15

Checking and Analyzing the IDS (Intrusion Detection System) events in case of conducting a Reconnaissance scans.

Checking the IDS (Intrusion Detection System) events while Reconnaissance Scan
02:50

In this video we'll learn how to store the nmap scan result automatically in the Metasploit database.

db_nmap
03:10

In this video we'll learn how to import a reconnaissance scan result into Metasploit database, this command can import from dozens of tools and frameworks but in this video w'll just provide a single example.

db_import
03:13

In this video we'll give a brief intro about Nessus then describe how to download and install it

Nessus - download and install
04:47

In this video we'll learn how to conduct a new scan and we'll go through the scan results to find more info about the target and the vulnerabilities impact that host and how to use that assessment if you need to fix and patch those vulnerabilities or in case you want to perform a pen-testing by exploiting those vulnerabilities.

Nessus - Scan a target
08:34

In this video we'll learn how to create and tune a new scan policy based on our network and environment. 

Nessus - Create and Tune a Scan Policy
06:45

Reconnaissance and Information gathering Quiz
1 question
+
Exploitation Phase
5 Lectures 23:27

in this video we'll learn how to search for and exploit using the msfconsol. 

w'll start with general search then gradually will tight and filter the search more till we find the most suitable exploit to conduct our attack.

Search for an Exploit
03:29

this video describes the exploitation phase and how to conduct a full attack on a Linux Ubuntu victim through exploiting a Bash Shellshock vulnerability.

A Demo for Exploiting a Linux target - Shellshock
08:52

this video describes the exploitation phase and how to conduct a full attack on a windows victim through exploiting a critical Microsoft SMB vulnerability.

A Demo for Exploiting a Windows target
05:15

A very interesting video presenting the IDS (Intrusion Detection System) events while a exploiting a Shellshock vulnerability.

Preview 03:02

A video presenting how the Open Source IDS SNORT detected the Bash Shellshock exploit.

and also a brief explanation to the SNORT custom rule responsible in catching this attack.

Preview 02:49

Exploitation Quiz
1 question
+
Post Exploitation Phase
3 Lectures 10:29

In this video we'll learn the below actions that can perform in the victim's machine:

  • how to display some basic info about the victim.
  • how to display the NICs installed in the victim and the IP addresses assigned to them.
  • how to list files and folders and change directories
  • how to download/upload files from/to the victim.
  • display the idle time of user using the console access of the victim.
Meterpreter - Part 1
03:34

In this video we'll learn the below actions that can perform in the victim's machine:

  • how to list the running process, get the user ID / process ID that Meterpreter using to run in the victim
  • how to migrate the Meterpreter session to another process.
  • how to get the password hashs of the usernames configured on the victim.
  • how to capture a screenshot to the victim's desktop.
Meterpreter - Part 2
04:04

In this video we'll learn how to clear your traces in a windows victim by wiping all the even logs using Meterpreter.

Clear your traces - Windows Victim
02:51

Post Exploitation Quiz
1 question
+
Armitage
3 Lectures 10:33

in this video we'll take a quick intro and description about Armitage.

Getting started with Armitage
01:45

in this video you'll learn how to add targets to Armitage and how to perform reconnaissance and host discovery scans on them.

Armitage - scanning
03:38

in this video w'll learn how to exploit and compromise a victim easily using just a few clicks then gain a meterpreter session to play and control our victim.

Armitage - exploiting
05:10

Armitage Quiz
1 question
+
Intrusion Detection System (IDS) Evasion
3 Lectures 02:53

Evading the Mcafee Intrusion Detection System (IDS) while exploiting the critical Bash Shellshock vulnerability by send the malicious bash command in a random invalid http request and thus the attack was not recognized by the IDS.

Intrusion Detection System (IDS) Evasion
02:21

Wireshark exploit packet analysis in case of No Evasion and also in case of Success Evasion to Mcafee (Intel Security) Intrusion Detection System (IDS)

Preview 00:09

 The fix history of the IDS Evasion while the Bash Shellshock Exploit

The Fix of the IDS Evasion while Bash Shellshock Exploit
00:23
About the Instructor
Ismail Eltahawy
4.2 Average rating
27 Reviews
2,237 Students
1 Course
Information Security Expert

Security Solution Expert at Orange Business Services with over 8 years experience in Information Security.

ُHave experience in Defensive and Offensive Security, Penetration Testing, IPS/IDS evasion techniques, Linux, Computer Networking, Firewalls, WAF, Web-filtering, Next Generation Firewalls, SIEM systems and more. 

My Job rules in the Information security Field Include:

- Design and develop new cloud security solutions based on vendor products (Intrusion Prevention, SIEM and Deep Inspection Firewalls)

- Design and develop new Security Solutions for the IPS/IDS and SIEM services

- Perform systems integration across multiple platforms (Linux, Unix, Raspberry Pi, Windows, IPSs, Threat Analyzers, HP Arcsight, Zscaler)

- Provide operations teams with the appropriate documentation and training and lead them during the rollout and deployment

- Design and test complex customer security solutions and architectures

- Certificates i have:
   Certified Information Systems Security Professional (CISSP)
   Certified Ethical Hacker (CEH v7)
   GIAC Certified Incident Handler (GCIH)
   GIAC Security Essentials Certification (GSEC)
   Juniper Networks Certified Internet Specialist (JNCIS-Sec)
   Juniper Networks Certified Internet Associate (JNCIA-Junos)
   Cisco Certified Network Associate Security (CCNA Security)    
   Cisco Certified Network Professional (CCNP)
   Cisco Certified Network Association (CCNA)