YoVDO

Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Penetration Testing Courses Kali Linux Courses Metasploit Courses Information Gathering Courses Password Cracking Courses Port Scanning Courses Vulnerability Assessment Courses Post Exploitation Courses

Course Description

Overview

Explore the comprehensive cycle of cyberattacks and penetration testing in this 54-minute lecture by Dr. Xinwen Fu from the University of Massachusetts, Lowell. Learn how to utilize Armitage, a GUI interface for the popular Metasploit tool, to perform information gathering, exploitation, and post-exploitation techniques. Discover the ease of conducting port scanning, hashdump, and password cracking with just a few clicks and commands. Gain insights into the Armitage interface, key terms, and practical examples using a Metasploitable target. Follow along as the lecture covers Armitage scanning, exploitation, and post-exploitation processes, including maintaining access and using Meterpreter commands. Understand the importance of screen capture and reporting in penetration testing. The lecture concludes with a demo setup, step-by-step instructions, and valuable references for further learning.

Syllabus

Intro
Outline
Cyberattacks
Cyberattack Cycle
Remote Exploit
Use credentials/Pass the hash
Armitage Interface
Terms
Example Target: Metasploitable
Armitage Scanning
Armitage Exploitation
Armitage Post Exploitation
Example Post Exploitation
Maintaining Access
Meterpreter commands!!!
Screen Capture!!!
Reports
Demo Setup
Steps
References


Taught by

CAE in Cybersecurity Community

Related Courses

Hacking and Patching
University of Colorado System via Coursera
Information security - IV
Indian Institute of Technology Madras via Swayam
Cisco CCNA 200-301 Complete Course: Packet Tracer Labs
Udemy
Cybersecurity Fundamentals: Architecting a Solution
Udemy
Network Ethical Hacking for beginners (Kali - Hands-on)
Udemy