Course Content

Module 1: Introduction & Kali Installation

11:33
1.1 Introduction
05:01
1.2 Introduction
06:17
1.3 Kali Installation

Module 2: Metasploit Fundamentals

01:45
2.1 Update Kali
05:23
2.2 Explore Metasploit Structure
02:37
2.3 Metasploit Database
13:27
2.4 The msfconsole Interface
01:30
2.5 Metasploit Payloads & Stagers
15:04
2.6 Encoders
07:19
2.7 Database Commands
11:21
2.8 Meterpreter
10:07
2.9 Meterpreter

Module 3: Information Gathering

10:02
3.1 Scanners
06:52
3.2 Scanners
05:36
3.3 Scanners
02:06
3.4 Discovering Exploits
01:45
3.5 Discovering Services

Module 4: Vulnerability Scanning

04:06
4.1 Login Attempt
02:51
4.2 VNC Scanner
06:12
4.3 WMAP
03:24
4.4 WMAP Scan
07:09
4.5 Nessus
05:35
4.6 Nessus
09:23
4.7 Nessus
07:46
4.8 Nessus

Module 5: Client Side Attacks

06:32
5.1 Intro
05:04
5.2 Generating the Payload
10:00
5.3 Starting Handler for Reverse Shell
06:56
5.4 Establishing the Reverse Shell
07:05
5.5 Windows 7 Reverse Shell
02:38
5.6 Establishing the Win Shell

Module 6: Post Exploitation

03:29
6.1 Explore Meterpreter
00:52
6.2 Screenshot
08:33
6.3 Privilege Escalation on Win7-32
03:29
6.4 Clearing Windows Event Logs
04:43
6.5 Using Incognito
08:40
6.6 Persistent Backdoor with NetCat
10:13
6.7 Remote Desktop Access with getgui
04:14
6.8 Sniffing the VICTIM's Packets
04:45
6.9 Port Forwarding
04:22
6.10 Changing File Attributes with Timestomp
03:01
6.11 Using the Search Function

Module 7: Maintaining Access

03:51
7.1 Keylogging with Keyscan
07:13
7.2 Running Metasploit as a Service

Module 8: Metasploit Extended Usage

11:39
8.1 Exploring mimikatz
08:53
8.2 Embedding Meterpreter in exe
10:44
8.3 File Inclusion Vulnerabilities
05:17
8.4 File Inclusion Vulnerabilities

Module 9: Using the Metasploit GUIs

05:42
9.1 Installing Metasploit Community Edition
01:24
9.2 Scanning Metasploitable
05:46
9.3 Import and Review Nessus Scan
04:45
9.4 GUI Overview
07:40
9.5 Armitage
07:15
9.6 Armitage and Wrap Up

Course Description

This Metasploit tutorial will teach you to utilize the deep capabilities of Metasploit for penetration testing. Take an in-depth look at the Metasploit Framework so that you can be confident that you are using this tool to its fullest capabilities. Metasploit's capabilities are wide, and this class will help you to prepare to run vulnerability assessments for organizations of any size. Here is what the class will cover: Fundamentals about the framework Framework organization How to install it How to contribute Usage Msfconsole Msfcli Msfvenom Resource Files Scanning Port scanning Vulnerability scanning Exploitation Network based exploit Client side exploit Browser Autopwn Local exploits Post Exploitation Meterpreter Meterpreter scripts Post exploitation modules Pivoting Privilege Escalation Information Gathering Avoiding Detection Writing Metasploit Modules Writing an exploit module Writing an auxiliary module Writing a post exploitation module Meterpreter scripting Railgun Are you hoping to become a penetration tester? This course could take you one more step down your career path toward your goal. Sign up for Cybrary's Career Path program today!

What is Metasploit?

Metasploit Framework, created by the Metasploit Project, is the mot popular exploitation tool available for developing, testing, and performing exploits. It allows penetration testers, auditors, and vulnerability assessment personnel to create their own penetration testing systems and exploit modules.

What Does this Metasploit Tutorial Cover?

Cybrary's online Metasploit course will help you learn how to use the Metasploit Framework software for penetration testing. The goal of this course is to ensure that users are taking advantage of all that the platform has to offer. When you have completed the class, you will have in-depth knowledge of the Metasploit software, and you will be ready to offer your organization even better security and protection from cyber attacks. The course covers the following Metasploit topics: - Fundamentals about Metasploit Framework

  • Usage
  • Scanning
  • Exploitation
  • Post Exploitation
  • Writing Metasploit Modules

In this course you will learn to use the Metasploit framework platform, how to perform penetration tests on applications and databases, how to perform attacks and test vulnerabilities, and how to take control over working computers. This course has a total of 5 hrs. 39 min. clock hours. Upon finishing the course, you will receive a Certificate of Completion.

Are There Prerequisites for the Metasploit Class?

There are no prerequisites for this course and you do not have to have programming skills or IT work experience. This is a course that is useful to IT security beginners as well as those already in a cybersecurity position. It is recommended that you have general IT knowledge and it is good to be familiar with Linux/Unix OS (but this isn't required).

Who Should Take the Metasploit Training?

Every current penetration tester should have knowledge of Metasploit. Additionally, it is useful for: - Future penetration testers

  • Vulnerability assessment personnel
  • Security Engineers
  • Security Researchers
  • Auditors
  • Programmers
  • Any IT professional who has to test regularly to maintain compliance requirements
  • Any IT professional who runs scheduled testing of security infrastructure as a best practice

Why Take this Metasploit Tutorial?

Whether you are currently working in the cybersecurity field or just beginning your IT career, taking the Metasploit training course will be beneficial to you in various ways. It is a tool that has the potential to achieve the same power as other pricey commercial tools. If you are new to the IT industry, perhaps just embarking on your career, you need to know Metasploit. The training course will teach you how to utilize the software platform to conduct attacks, identify vulnerabilities, and patch them. Metasploit is a platform that you will likely be expected to be familiar with as you search for employment, as most IT organizations do use it. If you are currently working in a cybersecurity role, this course offers you additional knowledge that will enhance your penetration testing skills. While you may already have some familiarity with Metasploit, our online course will still be beneficial to you because it's estimated that users only rely on about 10 percent of the platform's functionality. This course will help you completely master that 10 percent, while introducing you to the additional 90 percent of Metasploit's features that you are not currently taking advantage of. This will not only increase your overall knowledge, it will improve the efficacy of your testing and ability to protect your company's information, making you even more valuable to your organization.

Instructed By

Instructor Profile Image
Dean Pompilio
Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Metasploit Certificate of Completion