Video description
Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.
What You Will Learn
- Understand Metasploit and the Metasploit commands used in the command line interface
- Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the evasion options
- Meterpreter commands to get you started and help familiarize you with this most powerful tool
- Use of Metasploit as a vulnerability scanner leveraging tools such as NMap and Nessus
- Use Pivoting for routing traffic from a normally non-routable network
- Perform test services such as SCADA, and test in a highly secured environment
- Simulate attacks on web servers and systems with Armitage
Audience
This course is a primer for the use of Metasploit. Designed for people interested in system security and pentesting using the Metasploit framework. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.
About The Author
Shane Hartman: Shane Hartman, Founder and Executive Director of SpecterLabs. With over 20 years of IT experience ranging from network engineering to enterprise security, His experience gives him a broad understanding security needs facing the IT industry today. He has a masters degree in digital forensics and currently teaches forensics, enterprise security, and offensive computing at the collegiate level. https://www.linkedin.com/in/shanehartman/
Table of contents
- Chapter 1 : Working and Setting Up Metasploit Architecture
- Chapter 2 : Scanning and Information Gathering
- Chapter 3 : Launching Payloads with Meterpreter
- Chapter 4 : Executing Client Type Exploitation
- Chapter 5 : Server-Side Exploitation
- Chapter 6 : Types of Exploits and Operations
- Chapter 7 : Phishing and Visualization
- Chapter 8 : Advanced Metasploit
Product information
- Title: Metasploit Unleashed: Build defense against complex attacks
- Author(s):
- Release date: January 2020
- Publisher(s): Packt Publishing
- ISBN: 9781789618846
You might also like
video
Hands-On Network Scanning with Nmap for Network Security
Do you want to enhance your organization’s network security? Are you worried about what could happen …
video
Security Penetration Testing The Art of Hacking Series LiveLessons
10 Hours of Expert Video Instruction Overview This course is a complete guide to help you …
video
Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today's DevOps and Cloud Environments
5+ Hours of Video Instruction More than 5 hours of video instruction to help you perform …
book
Linux Essentials for Cybersecurity
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK From …