Expert Metasploit Penetration Testing Series
Expert Metasploit Penetration Testing Series
What am I going to get from this course?
- Over 38 lectures and 2 hours of content!
- master the art of penetration testing using metasploit.
- understand the concepts of attack and defence using msf console.
- perform real-time attacks on virtual machines to test your pentesting abilities using metasploit.
- Step-by-step demonstration of the Metasploit framework using real-time examples, diagrams, and presentations for theoretical topics
- Covers all three phases of penetration testing in detail including additional tools, such as Armitage, Nmap, and Nessus
What is the target audience?
- this course is for secuirty enthusiasts, pen-testers and system administrators.
- The coruse starts with very basics of penetration testing, hence it is perfectly suitable for new learners of information security and penetration testing.
Curriculum
Section 1: GETTING STARTED WITH SCANNING - The first step to Pen-testing | |||
---|---|---|---|
Lecture 1 |
Scanning with Nmap
|
03:36 | ||
Lecture 2 |
More Nmap Scan Options
|
03:57 | ||
Lecture 3 |
Working with a Database to Store Scan Results
|
03:15 | ||
Lecture 4 |
Scanning with Auxiliary Modules
|
03:15 | ||
Lecture 5 |
Vulnerability Scanning with NeXpose
|
03:18 | |||
Section 2: WORKING WITH METASPLOIT PAYLOADS AND ENCODERS | |||
---|---|---|---|
Lecture 6 |
Working with msfpayload
|
03:18 | |
Lecture 7 |
Working with msfencode
|
02:39 | |
Lecture 8 |
Generating Complex Payloads
|
02:37 | |
Lecture 9 |
Setting Up Metasploit Exploit Modules and Reverse Handlers
|
01:53 | |
Lecture 10 |
Penetration Testing Using an Executable and Reverse Handler
|
02:11 | |
Section 3: WORKING WITH EXPLOIT MODULES | |||
Lecture 11 |
WinXP SP2 Vulnerability Assessment and Exploitation
|
03:19 | |
Lecture 12 |
Binding Shells and Changing Payloads
|
01:49 | |
Lecture 13 |
Understanding the Metasploit Directory Structure
|
03:40 | |
Lecture 14 |
Penetration Testing on a Linux Machine
|
03:17 | |
Section 4: CLIENT-SIDE EXPLOITATION USING METASPLOIT | |||
Lecture 15 |
Client-side Exploitation Based on Internet Explorer
|
02:37 | ||
Lecture 16 |
Exploitation Module Based on Adobe Reader
|
02:54 | ||
Lecture 17 |
Exploitation and Pen-testing Based on a Java Applet
|
02:11 | ||
Lecture 18 |
Targeting the Microsoft File Format's Vulnerabilities for Penetration Testing
|
02:40 | ||
Lecture 19 |
Browser Autopwn
|
02:37 | |||
Section 5: POST-EXPLOITATION WITH METERPRETER | |||
---|---|---|---|
Lecture 20 |
Understanding Meterpreter
|
03:09 | ||
Lecture 21 |
Meterpreter System Commands
|
02:44 | |||
Lecture 22 |
Privilege Escalation Using Meterpreter
|
02:32 | |
Lecture 23 |
Meterpreter File System Commands
|
01:54 | |
Lecture 24 |
Meterpreter User Interface Commands
|
04:01 | |
Section 6: ADVANCED METERPRETER | |||
---|---|---|---|
Lecture 25 |
Passing the Hash
|
02:55 | |
Lecture 26 |
Setting Up Persistent Connection Using Meterpreter
|
02:59 | |
Lecture 27 |
Meterpreter Networking Commands
|
04:11 | |
Lecture 28 |
Pivoting
|
03:46 | |
Lecture 29 |
Railgun
|
02:35 | |
Section 7: WORKING WITH AUXILIARY MODULES | |||
Lecture 30 |
Understanding the Module Directory Structure and Auxiliary Modules
|
03:12 | |
Lecture 31 |
Working with Admin Auxiliary Modules
|
02:58 | |
Lecture 32 |
Denial-of-service Auxiliary Modules
|
02:36 | |
Lecture 33 |
Fuzzer Auxiliary Modules
|
02:33 | |
Lecture 34 |
Post Exploitation Auxiliary Modules
|
02:22 | |
Section 8: WORKING WITH ARMITAGE | |||
Lecture 35 |
Getting Started with Armitage
|
02:07 | |
Lecture 36 |
Scanning with Armitage
|
02:39 | |
Lecture 37 |
Launching Exploits against a Target Using Armitage
|
02:43 | |
Lecture 38 |
Post Exploitation Using Armitage
|
03:10 |
0 comments: