Metasploit

Approaching a Penetration Test Using Metasploit

1
Metasploit – Organizing a penetration test
2
Metasploit – Mounting the environment
3
Metasploit – The fundamentals of Metasploit
4
Metasploit – Conducting a penetration test with Metasploit
5
Metasploit – Benefits of penetration testing using Metasploit
6
Metasploit – Case study – reaching the domain controller
7
Metasploit – Revisiting the case study

Reinventing Metasploit

1
Metasploit – Ruby – the heart of Metasploit
2
Metasploit – Understanding Metasploit modules
3
Metasploit – Developing an auxiliary – the FTP scanner module
4
Metasploit – Developing an auxiliary—the SSH brute force module
5
Metasploit – Developing post-exploitation modules
6
Metasploit – Post-exploitation with RailGun

The Exploit Formulation Process

1
Metasploit – The absolute basics of exploitation
2
Metasploit – Exploiting a stack overflow vulnerability with Metasploit
3
Metasploit – Exploiting SEH-based buffer overflows with Metasploit
4
Metasploit – Bypassing DEP in Metasploit modules
5
Metasploit – Other protection mechanisms

Porting Exploits

1
Metasploit – Importing a stack-based buffer overflow exploit
2
Metasploit – Importing a web-based RCE exploit into Metasploit
3
Metasploit – Importing TCP server/browser-based exploits into Metasploit

Testing Services with Metasploit

1
Metasploit – The fundamentals of testing SCADA systems
2
Metasploit – Database exploitation
3
Metasploit – Testing VOIP services

Virtual Test Grounds and Staging

1
Metasploit – Performing a penetration test with integrated Metasploit services
2
Metasploit – Generating manual reports

Client-Side Exploitation

1
Metasploit – Exploiting browsers for fun and profit
2
Metasploit – Compromising the clients of a website
3
Metasploit – Metasploit and Arduino – the deadly combination
4
Metasploit – File format-based exploitation
5
Metasploit – Attacking Android with Metasploit

Metasploit Extended

1
Metasploit – Basic Windows post-exploitation commands
2
Metasploit – Windows versus Linux basic post-exploitation commands
3
Metasploit – Advanced Windows post-exploitation modules
4
Metasploit – Advanced multi-OS extended features of Metasploit
5
Metasploit – Privilege escalation with Metasploit

Evasion with Metasploit

1
Metasploit – Evading Meterpreter detection using C wrappers and custom encoders
2
Metasploit – Evading Meterpreter with Python
3
Metasploit – Evading intrusion detection systems with Metasploit
4
Metasploit – Bypassing Windows firewall blocked ports

Metasploit for Secret Agents

1
Metasploit – Maintaining anonymity in Meterpreter sessions using proxy and HOP payloads
2
Metasploit – Maintaining access using search order hijacking in standard software
3
Metasploit – Harvesting files from target systems
4
Metasploit – Using Venom for obfuscation
5
Metasploit – Covering tracks with anti-forensics modules

Visualizing Metasploit

1
Metasploit – Kage for Meterpreter sessions
2
Metasploit – Automated exploitation using Armitage
3
Metasploit – Red teaming with the Armitage team server
4
Metasploit – Scripting Armitage

Tips and Tricks

1
Metasploit – Automation using the Minion script
2
Metasploit – Using connect instead of Netcat
3
Metasploit – Shell upgrades and background sessions
4
Metasploit – Naming conventions
5
Metasploit – Saving configurations in Metasploit
6
Metasploit – Using inline handler and renaming jobs
7
Metasploit – Running commands on multiple Meterpreters
8
Metasploit – Automating the Social Engineering Toolkit
9
Metasploit – Cheat sheets for Metasploit and penetration testing

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 0 students
Lectures: 58

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Price:
Free