YoVDO

Perform Attacks with Metasploit

Offered By: Pluralsight

Tags

Penetration Testing Courses Metasploit Courses

Course Description

Overview

This course will teach you how to leverage Metasploit, attack targets and gain privileged access using multiple techniques.

Do you want to work as a penetration tester and to gain more experience in using the more advanced features of Metasploit? In this course, Perform Attacks with Metasploit, you’ll learn to follow a systematic approach and leverage weaknesses at the client side and how to apply methods of post exploitation once access has been gained. First, you’ll explore the process of attacking using implanted executable files for access. Next, you’ll discover how to effectively perform post exploitation with the Meterpreter shell payload. Finally, you’ll learn how to interpret the results from the output of the Metasploit toolkit and create the components of a deliverable report. When you’re finished with this course, you’ll have the skills and knowledge of using attacks against a client and methods to extract the information required for a report by performing post exploitation methods and techniques

Syllabus

  • Course Overview 1min
  • Demonstrate Client - Side Attacks 44mins
  • Investigating the Meterpreter Payload 40mins
  • Interpret Metasploit Framework Output 44mins

Taught by

Kevin Cardwell

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent