Metasploit Unleashed: Build defense against complex attacks

Video description

Add superior end-to-end security to your network using Metasploit

About This Video

  • Gain the skills to carry out penetration testing in complex and highly-secured environments
  • Get equipped with the Metasploit framework, exploit and generate modules for a variety of real-world scenarios
  • Practical guide to understand and implement new useful methods and techniques to make your network robust and resilient

In Detail

Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.

Table of contents

  1. Chapter 1 : Working and Setting Up Metasploit Architecture
    1. The Course Overview 00:03:37
    2. Organizing a Pentest with Metasploit 00:07:18
    3. Introduction to Exploitation 00:06:02
    4. Metasploit Installation 00:04:51
    5. Metasploit Interfaces and Modules 00:06:14
    6. Metasploit Databases 00:07:42
    7. Metasploitable Setup 00:07:42
  2. Chapter 2 : Scanning and Information Gathering
    1. Scanning with Metasploit 00:08:33
    2. Nmap Integration for Advanced Scanning 00:06:19
    3. Nessus integration in to Metasploit 00:06:48
    4. Scanning with Nessus 00:09:58
    5. Nexpose Integration to Prioritize Vulnerabilities 00:06:42
  3. Chapter 3 : Launching Payloads with Meterpreter
    1. What Is Meterpreter? 00:06:26
    2. Working with Meterpreter 00:06:16
    3. Meterpreter Scripting 00:09:21
    4. Working with Railgun 00:10:21
    5. Custom Meterpreter Scripts 00:12:59
  4. Chapter 4 : Executing Client Type Exploitation
    1. Types of Client-Side Exploits 00:05:50
    2. Browser Exploits to Breach Browser Security 00:10:10
    3. Exploit File Formats to Create Custom Files 00:09:18
    4. Standalone Attacks 00:04:58
    5. Delivering Exploits 00:08:57
  5. Chapter 5 : Server-Side Exploitation
    1. Server-Side Exploitation Types 00:11:18
    2. Exploiting Web Servers 00:09:32
    3. Exploit Database with Remote Exploits 00:08:38
    4. Exploiting VOIP 00:09:33
    5. Exploiting SCADA Systems 00:09:39
  6. Chapter 6 : Types of Exploits and Operations
    1. Privilege Escalation to Grant Access 00:10:20
    2. Gathering Passwords with Mimikatz and Kiwi 00:10:07
    3. Post Exploitations 00:06:12
    4. Maintaining Access 00:08:29
    5. Covering Your Tracks 00:08:45
  7. Chapter 7 : Phishing and Visualization
    1. Social Engineering Toolkit (SET) 00:07:41
    2. Using Armitage to Share Access 00:12:04
    3. Turning on RDP 00:08:38
    4. Screen Capture, Keylogging, and Webcam 00:11:16
    5. Manipulating the Registry 00:10:59
  8. Chapter 8 : Advanced Metasploit
    1. Evasion with MSFvenom 00:09:38
    2. Evasion with Veil 00:07:28
    3. Evasion with Trojanizer 00:04:15
    4. Evasion with Metasploit 00:06:13
    5. Creating Custom Modules 00:07:16
    6. Implementing Custom Modules 00:09:25

Product information

  • Title: Metasploit Unleashed: Build defense against complex attacks
  • Author(s): Shane Hartman
  • Release date: January 2020
  • Publisher(s): Packt Publishing
  • ISBN: 9781789618846