Metasploit Penetration Testing Recipes
About this video
In this course, you'll go through some great recipes that will allow you to build on your existing Metasploit knowledge and start using it effectively. You'll improve your skills with some best practices and techniques and implement some troubleshooting issues you'll encounter using Metasploit. You'll learn to perform intelligence gathering, threat modelling, vulnerability analysis, exploitation, and post-exploitation―all inside Metasploit.
You'll learn to create and customize payloads to evade antivirus software, bypass an organization's defences, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post-exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the Metasploit framework, create your own modules, and much more.
By the end of this course, you'll be proficient with many tools and techniques and will have mastered everything you need to perform penetration testing using Metasploit and virtual machines.
All the code and supporting files are on GitHub at https://github.com/PacktPublishing/-Metasploit-Penetration-Testing-Recipes
The Course Overview
- 01.Preparing the Environment
- 02.Conducting Metasploit Penetration Testing
- 03.White Box Metasploit Penetration Testing
- 04.Black Box Metasploit Penetration Testing
- 05.Client-Side Attacks
- 06.Post Exploitation
- 07.Building Custom Exploits
Key Features
- Exploit vulnerable targeted operating systems
- Automate the process of client-side attacks
- Evade AV detections efficiently
What You Will Learn
- Prepare the Metasploit framework and set up labs locally and remotely
- Understand Metasploit fundamentals
- Conduct penetration testing on different target scopes
- Perform client-side attacks on browsers and devices (bypassing AV detection)
- White- and black-box penetration testing steps
- Post exploitation on Windows and OS X
- Construct custom modules from scratch
![]() |
![]() |
Download Link
https://mega.nz/folder/xA4ARa6J#l07RRfWdYlfQEXxB1V-e6g
#Pentesting#Free-Courses#CyberSecurity#MetaExploit#Get-your own lab
Post a Comment