YoVDO

Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Penetration Testing Courses Kali Linux Courses Metasploit Courses Information Gathering Courses Password Cracking Courses Port Scanning Courses Vulnerability Assessment Courses Post Exploitation Courses

Course Description

Overview

Explore the comprehensive cycle of cyberattacks and penetration testing in this 54-minute lecture by Dr. Xinwen Fu from the University of Massachusetts, Lowell. Learn how to utilize Armitage, a GUI interface for the popular Metasploit tool, to perform information gathering, exploitation, and post-exploitation techniques. Discover the ease of conducting port scanning, hashdump, and password cracking with just a few clicks and commands. Gain insights into the Armitage interface, key terms, and practical examples using a Metasploitable target. Follow along as the lecture covers Armitage scanning, exploitation, and post-exploitation processes, including maintaining access and using Meterpreter commands. Understand the importance of screen capture and reporting in penetration testing. The lecture concludes with a demo setup, step-by-step instructions, and valuable references for further learning.

Syllabus

Intro
Outline
Cyberattacks
Cyberattack Cycle
Remote Exploit
Use credentials/Pass the hash
Armitage Interface
Terms
Example Target: Metasploitable
Armitage Scanning
Armitage Exploitation
Armitage Post Exploitation
Example Post Exploitation
Maintaining Access
Meterpreter commands!!!
Screen Capture!!!
Reports
Demo Setup
Steps
References


Taught by

CAE in Cybersecurity Community

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent