Video description
Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network.
This course is very hands-on. Presentations will be minimal because we believe the best way for you to learn is to have your hands on the keyboard. If you have the interest, passion, or desire to learn, We will guide you through this course step by step. You should be able to follow along with video instructions and please take notes! We will not only teach you how to use Metasploit, but we will teach it as if you were using it for a real penetration test!
Table of Contents
Chapter 1: Getting Started with Metasploit
Course Overview
Introduction to Metasploit and Pentesting
Downloading the Requirement Software and Images
Installing ISO Images or Virtual Image Files
Understanding Network Configuration Settings
Chapter 2: Getting Up and Running with Metasploit Basics
Exploring Metasploit Console Basics
Understanding Active and Passive Recon
Using NMAP
Getting Familiar with Modules
Discovering Hosts
Scanning and Fingerprinting Services
Chapter 3: Working with Exploits, Payloads, and Shells
Performing Exploit Research
Managing Payloads
Understanding Shells
Chapter 4: Process Migration with Meterpreter and Meterpreter Functions
Meterpreter Basics
Exploring Meterpreter Modules
Chapter 5: Firewalls, Antivirus, and External Callbacks
Firewall Concepts
Antivirus Concepts
Generating Payloads with MSFvenom
Encoding Payloads
Using Metasploit Across the Internet
Redirect Concepts
Chapter 6: Privilege Escalation and Persistence
Persistence Techniques with Meterptreter
Persistence Techniques with Netcat
Persistence Techniques with RDP
Privilege Escalation Techniques
Chapter 7: Lateral Movement, Pivoting, and Common Practices
Pass-The-Hash
Investigating the Box
Pivoting Concepts
Chapter 8: Final Thoughts and Wrapping Up
Other Resources
Final Thoughts