Post Exploitation with Meterpreter
Offered By: Pluralsight
Course Description
Overview
In a penetration test, escalating your privileges and exfiltrating data are some of the most important tasks of the assessment. This course will teach you how to use the Meterpreter tool for post-exploitation tasks.
During a penetration test engagement your job is to exploit the target systems, escalate privileges, create persistence, and exfiltrate data. In this course, Post Exploitation with Meterpreter, you’ll learn to perform all post-exploitation tasks with the Meterpreter tool, which is part of the Metasploit Framework. First, you’ll explore how to initiate a Meterpreter session and the basic Meterpreter shell commands. Next, you’ll discover how to escalate your privileges to gain admin-level access. Then, you’ll learn how to create persistence in the target system. Finally, you will learn how to use the Meterpreter tool to search and exfiltrate sensitive data. When you’re finished with this course, you’ll have the skills and knowledge of post exploitation with Meterpreter needed to perform a complete penetration test.
During a penetration test engagement your job is to exploit the target systems, escalate privileges, create persistence, and exfiltrate data. In this course, Post Exploitation with Meterpreter, you’ll learn to perform all post-exploitation tasks with the Meterpreter tool, which is part of the Metasploit Framework. First, you’ll explore how to initiate a Meterpreter session and the basic Meterpreter shell commands. Next, you’ll discover how to escalate your privileges to gain admin-level access. Then, you’ll learn how to create persistence in the target system. Finally, you will learn how to use the Meterpreter tool to search and exfiltrate sensitive data. When you’re finished with this course, you’ll have the skills and knowledge of post exploitation with Meterpreter needed to perform a complete penetration test.
Syllabus
- Course Overview 1min
- From Exploitation to Meterpreter Session 28mins
- Privilege Escalation 24mins
- Creating Persistence 24mins
- Searching and Exfiltrating Sensitive Data 22mins
Taught by
Ricardo Reimao
Related Courses
Python for Command-and-control, Exfiltration and ImpactInfosec via Coursera Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight Ethical Hacking: SQL Injection
Pluralsight Exfiltration with Dnscat2
Pluralsight Identify Common Cyber Network Attacks with Wireshark
Pluralsight