Metasploit Unleashed: Build defense against complex attacks
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Add superior end-to-end security to your network using MetasploitMetasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.About the AuthorShane Hartman, Founder and Executive Director of SpecterLabs. With over 20 years of IT experience ranging from network engineering to enterprise security, His experience gives him a broad understanding security needs facing the IT industry today. He has a masters degree in digital forensics and currently teaches forensics, enterprise security, and offensive computing at the collegiate level.
Facilities
Location
Start date
Start date
About this course
Understand Metasploit and the Metasploit commands used in the command line interface
Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the evasion options
Meterpreter commands to get you started and help familiarize you with this most powerful tool
Use of Metasploit as a vulnerability scanner leveraging tools such as NMap and Nessus
Use Pivoting for routing traffic from a normally non-routable network
Perform test services such as SCADA, and test in a highly secured environment
Simulate attacks on web servers and systems with Armitage
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Testing
- Network
- Installation
- Systems
- Network Training
Course programme
- To get an idea of the steps in a pentest
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Complete the installation of Metasploit
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Complete the installation of Metasploitable
- To get an idea of the steps in a pentest
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Complete the installation of Metasploit
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Complete the installation of Metasploitable
- To get an idea of the steps in a pentest
- To get an idea of the steps in a pentest
- To get an idea of the steps in a pentest
- To get an idea of the steps in a pentest
- To get an idea of the steps in a pentest
- To get an idea of the steps in a pentest
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Understand what exploits are
- Understand how exploits are used
- Understand how they might be leveraged in Metasploit
- Complete the installation of Metasploit
- Complete the installation of Metasploit
- Complete the installation of Metasploit
- Complete the installation of Metasploit
- Complete the installation of Metasploit
- Complete the installation of Metasploit
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Discuss the different ways to leverage Metasploit
- Discuss the GUI interface
- Discuss the command line interface
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Show the creation of Metasploit workspaces.
- Show how to navigate Metasploit workspaces
- Show how to delete Metasploit workspaces.
- Complete the installation of Metasploitable
- Complete the installation of Metasploitable
- Complete the installation of Metasploitable
- Complete the installation of Metasploitable
- Complete the installation of Metasploitable
- Complete the installation of Metasploitable
- The first steps are discovering what scanning ability Metasploit has built-in
- The second step is leveraging the appropriate scan for what you wish to accomplish
- Although not required the third step would be storing the scan information in a database for retrieval
- Accessing the Nmap engine either directly or through Metasploit console
- Importing the data for Metasploit to leverage
- Initiating scans in Nessus and then importing that information in to Metasploit
- Making a connection to Nessus scan engine and initiating a scan
- Accessing the Nexpose console ere are predefined commands that can get run to get information and further exploit the system.
- After establishing a Meterpreter session issue command such as getuid or...
Additional information
Metasploit Unleashed: Build defense against complex attacks
