Penetration testing with Metasploit

The arts of Metasploit

5.00 (2 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
Penetration testing with Metasploit
14
students
5 hours
content
Jul 2021
last update
$29.99
regular price

What you will learn

• Become an Expert in Using Metasploit

• Auxiliary Modules

• Payload Modules

• Exploit Modules

• Encoder Modules

• Post Modules

• MSFconsole

• Nmap integration and port scanning

• Vulnerability Scanning

• Exploitation and Gaining Access

• Post-exploitation-Meterpreter

• register exploit

Description

Welcome to " Penetration Testing with Metasploit" course.

The world’s most used penetration testing framework

In this course, Learn the popular security tools and techniques that you will need to run penetration tests with the best ethical hacking distribution Kali, and the tools: Nmap and Metasploit. If you don’t have any previous experience, not a problem! You'll go from beginner to extremely high-level and I will take you through each step with hands-on examples. learning the fundamentals of ethical hacking puts a powerful and very useful


As Metasploit says : Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.

Living in a world with full of vulnerability and cyber security threats, without any protection and prevention we walk through in the cyber world ! indeed all of us need to be cautious about the world we live in !

In this Course as you can see in the title, we are going to walk through into the Metasploit and vulnerability world and learn how to protect ourselves from all the threats in the professional ways in cyber security and penetration testing field !

In this Course we trying to import the most significant titles & most useful real-world practice to make sure you are going to be a professional in this filed !

We start the basic contents and finish with the most important one as well, it is notable to mention that all the contents are based on our real penetration testing with many years activities in this field such as fuzzing, buffer overflow, keylogger, Brower attack, shell to meterpreter, PowerShell, mp3 & mp4 and etc.


What you'll learn

· Become an Expert in Using Metasploit

· Auxiliary Modules

· Payload Modules

· Exploit Modules

· Encoder Modules

· Post Modules

· MSFconsole

· Nmap integration and port scanning

· Vulnerability Scanning

· Exploitation and Gaining Access

· Post-exploitation-Meterpreter

· register exploit




  • Notwithstanding, all the scenarios should be practiced in a practical environment or virtual machine, and we would not take any responsibilities for purpose or cause of the use.

Content

Introduction

Introduction

Metasploit framework

Metasploit framework

Intro msf

Intro msf

Scanning with Metasploit

Scanning with Metasploit
Scanning with Metasploit part 2

Scanning WordPress with Metasploit

Scanning WordPress with Metasploit

getting access with vsftpd

getting access with vsftpd

getting access with samba

getting access with samba

getting access with Netcat

getting access with Netcat

getting access with PowerShell

getting access with PowerShell

getting access with irc and distc

getting access with irc and distc

getting access with vnc and java

getting access with vnc and java

getting access with eternalblue

getting access with eternalblue

brute force attack

brute force attack

shell to meterpreter

shell to meterpreter

set exploit on mp3 and mp4 file

set exploit on mp3 and mp4 file

maintaining access

maintaining access

Basic command in meterpreter

Basic command in meterpreter shell

Meterpreter important commands

Meterpreter important commands 1
meterpreter important commands 2

Create server file

Create server file

Create backdoor file

Create backdoor file

Instructional commands

Instructional commands

Sending and receive data

Sending and receive data

Compiling the program

Compiling the program

change directory to target

change directory to target

Downloading file

Downloading file

Uploading file

Uploading file

Projects

Projects 1
Projects 2

Bonus part

Bonus part
nmap tips

Charts

Price

Penetration testing with Metasploit - Price chart

Rating

Penetration testing with Metasploit - Ratings chart

Enrollment distribution

Penetration testing with Metasploit - Distribution chart
4183020
udemy ID
7/13/2021
course created date
8/6/2021
course indexed date
Bot
course submited by