O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Hands-on Web Penetration Testing with Metasploit 4.x

Video Description

Test and secure your system services. Implement efficient techniques with Metasploit

About This Video

  • Exploit your system vulnerabilities using Metasploit, Nmap, Nessus, Meterpreter, Veil frameworks.
  • Use the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenarios
  • Implement useful new methods and techniques to make your network robust and resilient using Metasploit

In Detail

Prepare yourself for common attacks, simulate real-world possibilities, and learn from test scenarios and case studies.

You'll carry out exploitations, build/port exploits of various kinds in Metasploit, find weaknesses in target systems, and hunt for vulnerabilities using Metasploit and its supporting tools. You'll master the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. Towards the end of the course, you will implement time-saving techniques using Metasploit.

By the end of the course, you will know how to fully protect your system using Metasploit, and will have gained the skills to carry out penetration testing in complex and highly-secured environments.

Table of Contents

  1. Chapter 1 : Build Your Own Ethical Hacking Lab
    1. The Course Overview 00:02:32
    2. Exploring VirtualBox 00:07:33
    3. Installation of Kali Linux Part – 1 00:08:45
    4. Installation of Kali Linux Part – 2 00:09:21
    5. Installation of Windows 00:07:52
    6. Installation of Metasploitable 00:09:00
  2. Chapter 2 : Steps for Ethical Hacking
    1. Methodolo-gy of Hack-ers 00:05:32
    2. Understand-ing Bit Hacker Jar-gon! 00:04:54
    3. Reconnais-sance and Passive In-formation Gathering 00:08:32
  3. Chapter 3 : Scanning with Nmap
    1. Usage of Metasploit-able 00:07:14
    2. Usage of Zenmap 00:09:26
    3. Exploring Open Ports 00:07:28
    4. Using Me-tasploit 00:08:44
  4. Chapter 4 : Scanning with Nessus
    1. Download-ing Nessus 00:05:18
    2. Installation of Nessus 00:06:33
    3. Scan Results of Nessus 00:07:08
    4. Aggressive Scan Re-sults 00:07:41
  5. Chapter 5 : Exploits with Metasploit
    1. Metasploit Framework Files 00:09:29
    2. Metasploit Framework Overview 00:06:49
    3. Searching for Exploits 00:04:45
    4. Payloads and Exploits 00:05:55
    5. Gaining Ac-cess 00:05:10
  6. Chapter 6 : Working with Backdoors
    1. Understanding Tro-jan/Backdoors 00:02:30
    2. Veil Installa-tion 00:06:56
    3. Veil Over-view 00:04:22
    4. Backdoor Creation 00:06:51
    5. Delivery of the Back-door 00:06:33
    6. Using Back-door with Metasploit 00:04:28
  7. Chapter 7 : Post Exploit: Meterpreter
    1. Meterpreter Overview 00:01:45
    2. Using Me-terpreter Commands 00:06:56
    3. Stealing Info and Screen-shotter 00:05:40
    4. Maintaining Access 00:08:25
  8. Chapter 8 : Gather, Present, and Monitor Your Report
    1. Monitor Your Re-sources 00:03:25
    2. Writing the Draft 00:03:15
    3. Finalize and Present the Report 00:04:13