Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Metasploit Framework: Penetration Testing with Metasploit
Introduction to Penetration Testing Using Metasploit
Why Metasploit Framework? AKA: MSF (5:33)
What is a Penetration Test? (3:19)
Importance of Penetration Testing (3:15)
Basics of Penetration Testing (2:18)
Types of Penetration Testing (3:38)
Penetration Testing Execution Standard (5:40)
Create Lab VirtualBOX
Download and Install Kali Linux -VirtualBox (7:36)
Download and Install VirtualBOX (2:02)
Download and Install Kali Linux Image File (2:40)
Download and add Metasploitable Image File (2:40)
Windows 7 Add VirtualBox (1:47)
Create Nat Network and Connections Test with VirtualBox (7:32)
Create Lab VmWare
Kali Linux Install VMWare (5:39)
VmWare Download and Install (1:49)
Kali Image File Add VmWare (2:02)
Metasploitable Add VmWare (2:15)
Win7 add VmWare (1:59)
Create Nat Network and Connections Test with VmWare (6:12)
Meet The Metasploit
Introduction to MSF (1:22)
Evolution of Metasploit (4:18)
Metasploit Filesystem and Libraries (4:31)
The Architecture of MSF (1:43)
Auxiliary Modules (4:37)
Payload Modules (6:00)
Exploit Modules (3:33)
Encoder Modules (2:35)
Post Modules (3:24)
Metasploit Editions (4:02)
Metasploit Community (3:09)
Metasploit Interfaces (4:50)
Armitage (3:16)
MSFconsole (4:53)
MSFConsole Basic Commands 1 (6:44)
MSFConsole Basic Commands 2 (7:59)
MSFConsole Basic Commands 3 (3:32)
Using Databases in MSF 1 (5:43)
Using Databases in MSF 2 (3:14)
More on Exploits in MSF (3:14)
What's new in Metasploit Framework 6.0?
Quiz
Enumeration
What is Enumeration? (2:03)
Nmap Integration and Port Scanning (6:17)
SMB and Samba Enumeration (5:40)
MySQL Enumeration (3:40)
FTP Enumeration (4:15)
SSH Enumeration (2:30)
HTTP Enumeration (6:02)
SNMP Enumeration (3:43)
SMTP Enumeration (3:49)
Using Shodan with MSF (4:58)
Quiz
Vulnerability Scanning
Intro to Vulnerability Scanning (3:50)
Nessus® Home vs Nessus® Essentials
Downloading and Installing Nessus Home (5:42)
Vulnerability Scanning with Nessus Home (6:56)
Integrating Nessus into MSF (4:40)
Quiz
Exploitation and Gaining Access
Msfconsole Exploit Search & Ranking (3:38)
Metasploit as Exploitation Tool (1:52)
Distributed Ruby Remote Code Execution (drb_remote_codeexec) (3:14)
PHP CGI Argument Injection (php_cgi_arg_injection) (3:10)
MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption (3:59)
Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server) (3:05)
Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce) (3:14)
Sun/Oracle GlassFish Server Authenticated Code Execution (glassfish_deployer) (5:40)
Jenkins-CI Script-Console Java Execution (jenkins_script_console) (5:44)
WinRM Script Exec Remote Code Execution (winrm_script_exec) (4:02)
HTTP Writable Path PUT/DELETE File Access (http_put) (5:03)
Exploiting Poorly Configured MySQL Service (3:10)
Axis2 / SAP Business Objects Authenticated Code Execution via SOAP (4:47)
Using Allports Payload (6:17)
Using Resource Files (6:40)
Quiz
Post-Exploitation - Meterpreter
Post-Exploitation: Meterpreter (2:18)
Meterpreter (3:00)
Basic Meterpreter Commands 1 (6:11)
Basic Meterpreter Commands 2 (3:33)
Basic Meterpreter Commands 3 (4:46)
Privilege Escalation (8:23)
Extracting Password Hashes (4:59)
John the Ripper Module (1:33)
Pass The Hash with Metasploit (5:46)
Token Impersonation (5:45)
Extracting Cleartext Passwords (9:47)
Visual Interaction with the Target (3:47)
Enabling Remote Desktop (5:22)
Searching for Critical Information (5:48)
Packet Sniffing (6:22)
Pivoting (10:02)
Port Forwarding (7:45)
Meterpreter Scripts (4:25)
Meterpreter Python / Powershell Extension (8:06)
Maintaining Access (1:58)
Interacting with the Registry (6:37)
Keylogging (7:04)
Meterpreter Backdoor and Persistency Modules (9:34)
Quiz
Antivirus Evasion and Cleaning
MSFvenom (7:06)
Antivirus Evasion and Cleaning (2:46)
MSFVenom: Using Encoders (4:12)
MSFVenom: Using Custom Executable Template (5:31)
Using Custom Payload Generators (8:33)
Cleaning Events and Security Management Logs (3:35)
Deceiving File System Using Timestomp (6:06)
Quiz
Using Custom Payload Generators
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock