Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Metasploit Framework: Penetration Testing with Metasploit
Introduction to Penetration Testing Using Metasploit
Why Metasploit Framework? AKA: MSF (5:33)
What is a Penetration Test? (3:19)
Importance of Penetration Testing (3:15)
Basics of Penetration Testing (2:18)
Types of Penetration Testing (3:38)
Penetration Testing Execution Standard (5:40)
Create Lab VirtualBOX
Download and Install Kali Linux -VirtualBox (7:36)
Download and Install VirtualBOX (2:02)
Download and Install Kali Linux Image File (2:40)
Download and add Metasploitable Image File (2:40)
Windows 7 Add VirtualBox (1:47)
Create Nat Network and Connections Test with VirtualBox (7:32)
Create Lab VmWare
Kali Linux Install VMWare (5:39)
VmWare Download and Install (1:49)
Kali Image File Add VmWare (2:02)
Metasploitable Add VmWare (2:15)
Win7 add VmWare (1:59)
Create Nat Network and Connections Test with VmWare (6:12)
Basic Networking
What is āProtocolā (5:38)
Reference Models (0:24)
OSI Reference Model (13:46)
OSI vs TCP/IP (2:35)
Demonstration using Wireshark (8:02)
Standards & Protocols (3:52)
Ethernet: Principles, Frame & Headers (4:09)
ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets (6:12)
Introduction to Network Layer (1:39)
Internet Protocol - IP (2:51)
IPv4 Adressing System (1:58)
IPv4 Subnetting: Classful Networks (2:38)
IPv4 Subnetting: Subnet Mask (3:01)
IPv4 Subnetting: Understanding (3:12)
IPv4 Shortage (1:43)
Private Networks (4:01)
NAT ā Network Address Translation (4:32)
IPv6, Packet Header & Addressing (8:32)
DHCP - How the Mechanism Works (9:26)
ICMP ā Internet Control Message Protocol (2:04)
Introduction to Transport Layer (2:42)
TCP ā Transmission Control Protocol (7:02)
UDP ā User Datagram Protocol (3:58)
Introduction to Application Layer (0:57)
DNS ā Domain Name System (5:58)
HTTP ( Hyper Text Transfer Protocol ) (3:12)
HTTPS (1:56)
Meet The Metasploit
Introduction to MSF (1:22)
Evolution of Metasploit (4:18)
Metasploit Filesystem and Libraries (4:12)
The Architecture of MSF (1:43)
Auxiliary Modules (5:09)
Payload Modules (6:04)
Encoder Modules (2:51)
Exploit Modules (4:03)
Post Modules (3:34)
Metasploit Editions (4:02)
Metasploit Interfaces (5:32)
Armitage (3:58)
MSFconsole (5:21)
MSFConsole Basic Commands 1 (7:01)
MSFConsole Basic Commands 2 (9:18)
Using Databases in MSF (6:39)
More on Exploits in MSF (3:14)
What's new in Metasploit Framework 6.0?
Quiz
Enumeration
What is Enumeration? (2:03)
Nmap Integration and Port Scanning (8:14)
SMB and Samba Enumeration (10:37)
MySQL Enumeration (3:51)
FTP Enumeration (5:26)
SSH Enumeration (3:17)
HTTP Enumeration (7:55)
SNMP Enumeration (4:25)
SMTP Enumeration (4:26)
Using Shodan with MSF (6:06)
Quiz
Vulnerability Scanning
Intro to Vulnerability Scanning (3:50)
NessusĀ® Home vs NessusĀ® Essentials
Downloading and Installing Nessus Home (5:42)
Vulnerability Scanning with Nessus Home (6:56)
Integrating Nessus into MSF (4:40)
Quiz
Exploitation and Gaining Access
Msfconsole Exploit Search & Ranking (3:38)
Metasploit as Exploitation Tool (1:52)
PHP CGI Argument Injection (php_cgi_arg_injection) (4:42)
MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption (6:11)
Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server) (4:56)
Sun/Oracle GlassFish Server Authenticated Code Execution (glassfish_deployer) (7:52)
Jenkins-CI Script-Console Java Execution (jenkins_script_console) (8:47)
WinRM Script Exec Remote Code Execution (winrm_script_exec) (9:50)
Axis2 / SAP Business Objects Authenticated Code Execution via SOAP (7:17)
Using Allports Payload (7:42)
Using Resource Files (10:08)
Quiz
Post-Exploitation - Meterpreter
Post-Exploitation: Meterpreter (2:18)
Meterpreter (3:00)
Basic Meterpreter Commands 1 (5:27)
Basic Meterpreter Commands 2 (4:33)
Basic Meterpreter Commands 3 (5:17)
Privilege Escalation (6:29)
Extracting Password Hashes (5:54)
John the Ripper Module (3:04)
Pass The Hash with Metasploit (6:45)
Token Impersonation (6:03)
Extracting Cleartext Passwords (4:46)
Visual Interaction with the Target (6:33)
Enabling Remote Desktop (5:26)
Searching for Critical Information (7:54)
Packet Sniffing (6:49)
Port Forwarding (8:47)
Meterpreter Scripts (4:42)
Meterpreter Python / Powershell Extension (11:18)
Maintaining Access (1:58)
Interacting with the Registry (11:32)
Keylogging (8:53)
Meterpreter Backdoor and Persistency Modules (8:21)
Quiz
Antivirus Evasion and Cleaning
Antivirus Evasion and Cleaning (2:46)
MSFvenom (12:30)
MSFVenom: Using Encoders (5:31)
MSFVenom: Using Custom Executable Template (8:27)
Cleaning Events and Security Management Logs (3:58)
Deceiving File System Using Timestomp (5:53)
Quiz
FTP Enumeration
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock