Metasploit Penetration Testing Recipes
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 5m | 456 MB
Instructor: Lawrence Amer
Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
LearnPrepare the Metasploit framework and set up labs locally and remotely
Understand Metasploit fundamentals
Conduct penetration testing on different target scopes
Perform client-side attacks on browsers and devices (bypassing AV detection)
White- and black-box penetration testing steps
Post exploitation on Windows and OS X
Construct custom modules from scratch
AboutMetasploit is a Ruby-based platform for performing advanced penetration testing. It enables you to write, test, and execute exploit code. The Metasploit framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection.
In this course, you'll go through some great recipes that will allow you to build on your existing Metasploit knowledge and start using it effectively. You'll improve your skills with some best practices and techniques and implement some troubleshooting issues you'll encounter using Metasploit. You'll learn to perform intelligence gathering, threat modeling, vulnerability analysis, exploitation, and post-exploitation―all inside Metasploit.
You'll learn to create and customize payloads to evade antivirus software, bypass an organization's defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the Metasploit framework, create your own modules, and much more.
By the end of this course, you'll be proficient with many tools and techniques and will have mastered everything you need to perform penetration testing using Metasploit and virtual machines.
All the code and supporting files are on GitHub at:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.FeaturesExploit vulnerable targeted operating systems
Automate the process of client-side attacks
Evade AV detections efficiently
Download link:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.Links are Interchangeable - No Password - Single Extraction