O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Metasploit

Video Description

An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client-side attacks and anti-forensics

About This Video

  • Carry out penetration testing in highly-secured environments with Metasploit
  • Learn to bypass different defences to gain access to different systems.
  • A step-by-step guide that will quickly enhance your penetration testing skills.

In Detail

This course will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components used by Metasploit. Further, in the video, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools. Next, you'll get hands-on experience carrying out client-side attacks. Moving on, you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post-compromise. This video will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. By the end of this course, you'll get the hang of bypassing different defences, after which you'll learn how hackers use the network to gain access to different systems.

Table of Contents

  1. Chapter 1 : Introduction to Metasploit and Supporting Tools
    1. The Course Overview 00:06:30
    2. Exploring Metasploit 00:04:10
    3. Effective and Powerful Supplementary Tools 00:06:47
  2. Chapter 2 : Setting Up Your Environment
    1. Using the Kali Linux Virtual Machine 00:02:47
    2. Installation 00:03:41
    3. Setting Up Exploitable Targets in a Virtual Environment 00:02:43
  3. Chapter 3 : Metasploit Components and Environment Configuration
    1. Structure and Components of Metasploit 00:07:12
    2. Playing Around with msfconsole 00:05:40
    3. Variables and Updating the Metasploit 00:04:44
  4. Chapter 4 : Information Gathering with Metasploit
    1. Information Gathering and Enumeration 00:18:35
    2. Advance Features in Metasploit 00:03:29
  5. Chapter 5 : Vulnerability Hunting with Metasploit
    1. Nmap 00:03:17
    2. Managing the Database 00:06:07
    3. Nessus 00:03:39
  6. Chapter 6 : Client-Side Attacks with Metasploit
    1. Need of Client-Side Attacks 00:05:00
    2. The msfvenom Utility 00:05:36
    3. Social Engineering with Metasploit 00:05:33
  7. Chapter 7 : Web Application Scanning with Metasploit
    1. Setting Up a Vulnerable Application 00:01:51
    2. Web Application Scanning Using WMAP 00:03:01
    3. Metasploit Auxiliaries for Web Application Enumeration and Scanning 00:03:19
  8. Chapter 8 : Antivirus Evasion and Anti-Forensics
    1. Using Encoders to Avoid AV Detection 00:09:03
    2. Anti-Forensics 00:05:32
  9. Chapter 9 : Cyber Attack Management with Armitage
    1. Armitage Console 00:02:14
    2. Scanning and Enumeration 00:01:16
    3. Find and Launch Attacks 00:03:09
  10. Chapter 10 : Extending Metasploit and Exploit Development
    1. Exploit Development Concepts 00:03:55
    2. Exploit Templates and Mixins 00:04:55
    3. Adding External Exploits to Metasploit 00:03:44