Metasploit Unleashed: Build defense against complex attacks

Metasploit Unleashed: Build defense against complex attacks
Metasploit Unleashed: Build defense against complex attacks
English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 5h 54m | 1.42 GB

Add superior end-to-end security to your network using Metasploit

Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.


  • Understand Metasploit and the Metasploit commands used in the command line interface
  • Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the evasion options
  • Meterpreter commands to get you started and help familiarize you with this most powerful tool
  • Use of Metasploit as a vulnerability scanner leveraging tools such as NMap and Nessus
  • Use Pivoting for routing traffic from a normally non-routable network
  • Perform test services such as SCADA, and test in a highly secured environment
  • Simulate attacks on web servers and systems with Armitage
Table of Contents

1 The Course Overview
2 Organizing a Pentest with Metasploit
3 Introduction to Exploitation
4 Metasploit Installation
5 Metasploit Interfaces and Modules
6 Metasploit Databases
7 Metasploitable Setup
8 Scanning with Metasploit
9 Nmap Integration for Advanced Scanning
10 Nessus integration in to Metasploit
11 Scanning with Nessus
12 Nexpose Integration to Prioritize Vulnerabilities
13 What Is Meterpreter
14 Working with Meterpreter
15 Meterpreter Scripting
16 Working with Railgun
17 Custom Meterpreter Scripts
18 Types of Client-Side Exploits
19 Browser Exploits to Breach Browser Security
20 Exploit File Formats to Create Custom Files
21 Standalone Attacks
22 Delivering Exploits
23 Server-Side Exploitation Types
24 Exploiting Web Servers
25 Exploit Database with Remote Exploits
26 Exploiting VOIP
27 Exploiting SCADA Systems
28 Privilege Escalation to Grant Access
29 Gathering Passwords with Mimikatz and Kiwi
30 Post Exploitations
31 Maintaining Access
32 Covering Your Tracks
33 Social Engineering Toolkit (SET)
34 Using Armitage to Share Access
35 Turning on RDP
36 Screen Capture, Keylogging, and Webcam
37 Manipulating the Registry
38 Evasion with MSFvenom
39 Evasion with Veil
40 Evasion with Trojanizer
41 Evasion with Metasploit
42 Creating Custom Modules
43 Implementing Custom Modules