Metasploit Fundamentals - Exploitation and Victim Control Phase Premium class

Ismail Eltahawy

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
6 Videos (28m)
    • Metasploit - How to search for exploit

      3:29
    • Metasploit - Linux Bash Shellshock Exploitation Demo

      8:52
    • Metasploit - Microsoft SMB vulnerability Exploitation Demo

      5:15
    • Metasploit exploit and Analyzing (Intrusion Detection System) IDS events.

      3:02
    • Metasploit - Post exploitation Part 1

      3:34
    • Metasploit - Post Exploitation - Part 2

      4:04

About This Class

This class will teach you to how to perform Penetration Testing / Hacking using Metasploit, the world most popular and powerful exploiting framework then we'll learn how to control our victim/target optimaly.

3

Students

--

Projects

0

Reviews (0)

Security Solution Expert at Orange Business Services with over 8 years experience in Information Security.

ُHave experience in Defensive and Offensive Security, Penetration Testing, IPS/IDS evasion techniques, Linux, Computer Networking, Firewalls, WAF, Webfiltering, Next Generation Firewalls, SIEM systems and more.