Metasploit Unleashed: Build defense against complex attacks

Course

Online

£ 15 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Add superior end-to-end security to your network using MetasploitMetasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.About the AuthorShane Hartman, Founder and Executive Director of SpecterLabs. With over 20 years of IT experience ranging from network engineering to enterprise security, His experience gives him a broad understanding security needs facing the IT industry today. He has a masters degree in digital forensics and currently teaches forensics, enterprise security, and offensive computing at the collegiate level.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Understand Metasploit and the Metasploit commands used in the command line interface
Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the evasion options
Meterpreter commands to get you started and help familiarize you with this most powerful tool
Use of Metasploit as a vulnerability scanner leveraging tools such as NMap and Nessus
Use Pivoting for routing traffic from a normally non-routable network
Perform test services such as SCADA, and test in a highly secured environment
Simulate attacks on web servers and systems with Armitage

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Testing
  • Network
  • Installation
  • Systems
  • Network Training

Course programme

Working and Setting Up Metasploit Architecture 7 lectures 43:26 The Course Overview This video will give you an overview about the course. Organizing a Pentest with Metasploit The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
Introduction to Exploitation The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
Metasploit Installation The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
Metasploit Interfaces and Modules The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
Metasploit Databases The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
Metasploitable Setup The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
Working and Setting Up Metasploit Architecture - Quiz Working and Setting Up Metasploit Architecture 7 lectures 43:26 The Course Overview This video will give you an overview about the course. Organizing a Pentest with Metasploit The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
Introduction to Exploitation The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
Metasploit Installation The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
Metasploit Interfaces and Modules The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
Metasploit Databases The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
Metasploitable Setup The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
Working and Setting Up Metasploit Architecture - Quiz The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. This video will give you an overview about the course. This video will give you an overview about the course. Organizing a Pentest with Metasploit The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
Organizing a Pentest with Metasploit The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
Organizing a Pentest with Metasploit The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
Organizing a Pentest with Metasploit The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
The aim of this video is to give the student a framework for the pentesting process.
  • To get an idea of the steps in a pentest
Introduction to Exploitation The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
Introduction to Exploitation The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
Introduction to Exploitation The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
Introduction to Exploitation The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
The aim of this video is to introduce the concept of an exploit and what they are and how they are used.
  • Understand what exploits are
  • Understand how exploits are used
  • Understand how they might be leveraged in Metasploit
Metasploit Installation The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
Metasploit Installation The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
Metasploit Installation The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
Metasploit Installation The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
The aim of this video is to get an operational installation of Metasploit on the student machine.
  • Complete the installation of Metasploit
Metasploit Interfaces and Modules The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
Metasploit Interfaces and Modules The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
Metasploit Interfaces and Modules The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
Metasploit Interfaces and Modules The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
The aim of this video is to show the student the different ways in which they can interact with Metasploit.
  • Discuss the different ways to leverage Metasploit
  • Discuss the GUI interface
  • Discuss the command line interface
Metasploit Databases The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
Metasploit Databases The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
Metasploit Databases The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
Metasploit Databases The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
The aim of this video is to introduce the concept of storage of collected data.
  • Show the creation of Metasploit workspaces.
  • Show how to navigate Metasploit workspaces
  • Show how to delete Metasploit workspaces.
Metasploitable Setup The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
Metasploitable Setup The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
Metasploitable Setup The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
Metasploitable Setup The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
The aim of this video is to get an operational installation of Metasploitable for the students to use during the upcoming sections.
  • Complete the installation of Metasploitable
Working and Setting Up Metasploit Architecture - Quiz Working and Setting Up Metasploit Architecture - Quiz Working and Setting Up Metasploit Architecture - Quiz Working and Setting Up Metasploit Architecture - Quiz Scanning and Information Gathering. 5 lectures 38:20 Scanning with Metasploit Scanning is one of the core steps to information gathering. Metasploit has a built-in scanner for gathering and harvesting information about target systems.
  • The first steps are discovering what scanning ability Metasploit has built-in
  • The second step is leveraging the appropriate scan for what you wish to accomplish
  • Although not required the third step would be storing the scan information in a database for retrieval
Nmap Integration for Advanced Scanning The Nmap scanning framework can be used to enhance the Metasploit.
  • Accessing the Nmap engine either directly or through Metasploit console
  • Importing the data for Metasploit to leverage
Nessus integration in to Metasploit Metasploit scanning is very limited in comparison to a vulnerability scanner. Using Nessus can greatly enhance the use of Metasploit.
  • Initiating scans in Nessus and then importing that information in to Metasploit
Scanning with Nessus Using Metasploit to issue and conduct Nessus scans for use in Metasploit.
  • Making a connection to Nessus scan engine and initiating a scan
Nexpose Integration to Prioritize Vulnerabilities Metasploit scanning is very limited in comparison to a vulnerability scanner such as Nexpose. Using Nexpose can greatly enhance the use of Metasploit.
  • Accessing the Nexpose console ere are predefined commands that can get run to get information and further exploit the system.
    • After establishing a Meterpreter session issue command such as getuid or...

Additional information

No prior knowledge of Metasploit is assumed

Metasploit Unleashed: Build defense against complex attacks

£ 15 VAT inc.