Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
Offered By: CAE in Cybersecurity Community via YouTube
Course Description
Overview
Explore the comprehensive cycle of cyberattacks and penetration testing in this 54-minute lecture by Dr. Xinwen Fu from the University of Massachusetts, Lowell. Learn how to utilize Armitage, a GUI interface for the popular Metasploit tool, to perform information gathering, exploitation, and post-exploitation techniques. Discover the ease of conducting port scanning, hashdump, and password cracking with just a few clicks and commands. Gain insights into the Armitage interface, key terms, and practical examples using a Metasploitable target. Follow along as the lecture covers Armitage scanning, exploitation, and post-exploitation processes, including maintaining access and using Meterpreter commands. Understand the importance of screen capture and reporting in penetration testing. The lecture concludes with a demo setup, step-by-step instructions, and valuable references for further learning.
Syllabus
Intro
Outline
Cyberattacks
Cyberattack Cycle
Remote Exploit
Use credentials/Pass the hash
Armitage Interface
Terms
Example Target: Metasploitable
Armitage Scanning
Armitage Exploitation
Armitage Post Exploitation
Example Post Exploitation
Maintaining Access
Meterpreter commands!!!
Screen Capture!!!
Reports
Demo Setup
Steps
References
Taught by
CAE in Cybersecurity Community
Related Courses
Hacking and PatchingUniversity of Colorado System via Coursera Information security - IV
Indian Institute of Technology Madras via Swayam Cisco CCNA 200-301 Complete Course: Packet Tracer Labs
Udemy Cybersecurity Fundamentals: Architecting a Solution
Udemy Network Ethical Hacking for beginners (Kali - Hands-on)
Udemy