Oreilly - Beginning Metasploit
by | Publisher: Packt Publishing | Release Date: October 2018 | ISBN: 9781789347555
Ultimate guide to getting started with the Metasploit Framework. Access and test your system's security posture to reduce risk About This VideoA step-by-step guide that will quickly enhance your penetration testing skills. Covers the latest techniques and examples of penetration testing with MetasploitCarry out penetration testing in complex and highly-secured environments.In DetailMetasploit is a popular penetration testing framework and has one of the largest exploit databases around. It is an essential tool in the penetration tester's arsenal.This course teaches you the practical implementation of Metasploit. Each section will get you started with Metasploit by enumerating available services, identifying potential weaknesses, and testing vulnerabilities through exploitation. The course will show you how to correctly configure Metasploit and how to troubleshoot potential errors. You will scan the different services to identify vulnerabilities. Finally, you will explore sophisticated, real-world scenarios where performing penetration tests is a challenge.By the end of this course, you will be able to use Metasploit to quickly assess the security structure of systems and networks to reduce risk.
- Chapter 1 : Getting Started with Metasploit
- The Course Overview 00:06:02
- Fundamentals of Metasploit 00:11:10
- Metasploit Framework Console Commands 00:12:24
- Benefits of Metasploit 00:02:07
- Penetration Testing with Metasploit 00:14:00
- Chapter 2 : Scanning Services to Identify Vulnerabilities
- Scanning FTP Services 00:09:15
- Scanning MS SQL Services 00:09:55
- Scanning HTTP Services 00:08:01
- Chapter 3 : Exploitation with Metasploit
- Installing Metasploitable2 00:08:50
- Exploiting FTP 00:06:54
- Exploiting Browsers 00:08:17
- Exploiting Android 00:08:01
- Chapter 4 : Perform Post-Exploitation Techniques
- Post-Exploitation with Meterpreter 00:11:18
- Getting Password Hashes 00:04:01
- Privilege Escalation with Meterpreter 00:05:27
- Chapter 5 : Penetration Testing with Metasploit (Real-Life Examples)
- Fingerprinting and Scanning with Nmap 00:09:44
- Exploitation 00:07:04
- Spawning a tty Shell 00:04:56
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.