Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Finding and Exploiting Hidden Vulnerabilities
Vulnerability Assessment
The Course Overview (1:33)
Installing Nessus Vulnerability Scanner (9:51)
Using Nessus (9:50)
Exporting Nessus Output (5:39)
Installing OpenVas (6:06)
Using OpenVas (6:01)
Introducing Metasploit Framework
Setting up Metasploit (8:35)
Understanding Payloads and Exploits (9:01)
Importing Nessus Results (5:12)
Scanning with Metasploit (11:31)
Metasploit Interfaces (6:52)
Using Meterpreter (7:29)
Exploitation Using Metasploit
Creating Custom Backdoors for Different Platforms (4:10)
Msfvenom (10:45)
Encoders (6:17)
Exploiting MS Office and PDF Documents (12:10)
Social Engineering Toolkit (6:00)
Assembling the Pieces
Recap of Scope (4:26)
Information Gathered (2:59)
Vulnerabilities Identified (4:17)
Exploitable Vulnerabilities (4:27)
Documentation (8:35)
Exploiting MS Office and PDF Documents
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock