Skip to content

Metasploit Penetration Testing Recipes, Published by Packt

License

Notifications You must be signed in to change notification settings

PacktPublishing/-Metasploit-Penetration-Testing-Recipes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Metasploit Penetration Testing Recipes [Video]

This is the code repository for Metasploit Penetration Testing Recipes [Video], published by Packt. It contains all the supporting project files necessary to work through the video course from start to finish.

About the Video Course

Metasploit is a Ruby-based platform for performing advanced penetration testing. It enables you to write, test, and execute exploit code. The Metasploit framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection.

In this course, you'll go through some great recipes that will allow you to build on your existing Metasploit knowledge and start using it effectively. You'll improve your skills with some best practices and techniques and implement some troubleshooting issues you'll encounter using Metasploit. You'll learn to perform intelligence gathering, threat modeling, vulnerability analysis, exploitation, and post-exploitation―all inside Metasploit.

You'll learn to create and customize payloads to evade antivirus software, bypass an organization's defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the Metasploit framework, create your own modules, and much more.

By the end of this course, you'll be proficient with many tools and techniques and will have mastered everything you need to perform penetration testing using Metasploit and virtual machines.

What You Will Learn

    • Prepare the Metasploit framework and set up labs locally and remotely
    •Understand Metasploit fundamentals
    •Conduct penetration testing on different target scopes
    •Perform client-side attacks on browsers and devices (bypassing AV detection)
    •White- and black-box penetration testing steps
    •Post exploitation on Windows and OS X
    •Construct custom modules from scratch

Instructions and Navigation

Assumed Knowledge

With ever-increasing levels of complexity, this course covers most Metasploit features; it is not just for pentesters but also for professionals keen to master this awesome tool. A working knowledge of Metasploit is assumed.

Technical Requirements

Minimum Hardware Requirements

For successful completion of this course, students will require the computer systems with at least the following:

OS: GNU/Linux Distribution (Ubuntu, Debian, Gentoo ..etc)
Processor: Relatively modern CPU (Intel Core iX series 4th gen, AMD equivalent)
Memory: 2 GB
Storage: 10 GB FREE

Recommended Hardware Requirements

For an optimal experience with hands-on labs and other practical activities, we recommend the following configuration:

OS: GNU/ Linux Distribution ( Kali Operating system is Preferable )
Processor: Relatively modern CPU (Intel Core iX series 4th gen, AMD equivalent)
Memory: 4 GB
Storage: 20 GB Free

Related Products

About

Metasploit Penetration Testing Recipes, Published by Packt

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published