Video description
Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network.
This course is very hands-on. Presentations will be minimal because we believe the best way for you to learn is to have your hands on the keyboard. If you have the interest, passion, or desire to learn, We will guide you through this course step by step. You should be able to follow along with video instructions and please take notes! We will not only teach you how to use Metasploit, but we will teach it as if you were using it for a real penetration test!
Table of contents
- Chapter 1: Getting Started with Metasploit
- Chapter 2: Getting Up and Running with Metasploit Basics
- Chapter 3: Working with Exploits, Payloads, and Shells
- Chapter 4: Process Migration with Meterpreter and Meterpreter Functions
- Chapter 5: Firewalls, Antivirus, and External Callbacks
- Chapter 6: Privilege Escalation and Persistence
- Chapter 7: Lateral Movement, Pivoting, and Common Practices
- Chapter 8: Final Thoughts and Wrapping Up
Product information
- Title: Metasploit Like a Pro
- Author(s):
- Release date: August 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
video
OWASP Top 10 Security Fundamentals
Unless you try to exploit a vulnerability yourself, no reading will give you the required know-how …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
book
Hacking APIs
An Application Programming Interface (API) is a software connection that allows applications to communicate and share …
book
Mastering Linux Security and Hardening - Second Edition
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a …