Penetration / Hacking Testing Using Metasploit Premium class

Ismail Eltahawy

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
26 Videos (1h 34m)
    • Intro

      1:58
    • Metasploit - Introduction - Headlines

      0:41
    • Metasploit - Introduction - What is a Vulnerability ?

      1:17
    • Metasploit - Introduction - What is an Exploit and a Payload ?

      1:37
    • Metasploit - Introduction - What is and why ... Metasploit ?

      1:46
    • Metasploit - Interfaces - Msfconsol

      3:19
    • Metasploit - Interfaces - Msfcli

      4:15
    • Metasploit - Interfaces - Armitage

      0:50
    • Metasploit - Reconnaissance - NMAP Intro and different scanning options

      3:57
    • Metasploit -Reconnaissance - Analyzing Intrusion Detection System (IDS) events

      2:50
    • Metasploit - Reconnaissance - db_nmap

      3:10
    • Metasploit - Reconnaissance - db_import

      3:13
    • Metasploit - Reconnaissance - Nessus download and install

      4:47
    • Metasploit - Reconnaissance - Nessus Scan a target

      8:34
    • Metasploit - Reconnaissance - Nessus Create and Tune a Scan Policy

      6:45
    • Metasploit - Exploitation Phase - How to search for an exploit

      3:29
    • Metasploit - Exploitation Phase - Exploiting a Linux Victim / Target.

      8:52
    • Metasploit ShellShock and Analyzing Intrusion Detection System (IDS) events.

      3:02
    • Metasploit - Exploitation Phase - Exploiting a Windows Victim / Target.

      5:15
    • Metasploit - Exploitation Phase - Checking Intrusion Detection System (IDS) events while exploiting

      3:02
    • Metasploit - Post Exploitation - Meterpreter Part 1

      3:34
    • Metasploit - Post Exploitation - Meterpreter Part 2

      4:04
    • Metasploit - Post Exploitation - Meterpreter - Clear you traces in a Windows Victim

      2:51
    • Metasploit - Armitage - Intro

      1:45
    • Metasploit - Armitage - Reconnaissance

      3:38
    • Metasploit - Armitage - Exploit

      5:10

About This Class

This course will teach you to how to perform Penetration Testing / Hacking using Metasploit, the world most popular and powerful exploiting framework.

The course will teach you step-by-step how to gather information, exploit, control your target/victim and finally clear your traces.

The course material is presented in a practical real-life demos that will let you have hands-on the principles and techniques that will assist you to be a successful security professional, penetration-tester or any other career path related to the IT Security.

By the end of this course you’ll be able to perform Security Audits / Penetration Testing efficiently using Metasploit Framework.

This course will develop and empower your Information Security knowledge and thus will take your career path to a higher step.

Why this course is Special ?!

  • There is some lectures where i present the IDS (Intrusion Detection System) events capturing the attack / reconnaissance conducted in the presented demos.
  • 95% of the Course Content is practical real-life scenario demos.
  • The Course is updated from time-to-time with new videos and lessons.

This Course is continuously updated new lectures and lessons , after enrolling now you'll have a lifetime access to the current published lectures and the future one also.

Coming Soon Lectures :

  • Analyzing the Exploit and Reconnaissance captured packets using Wireshark
  • OpenVAS integration with Metasploit
  • Hail Mary attack in Armitage

9

Students

--

Projects

0

Reviews (0)

Security Solution Expert at Orange Business Services with over 8 years experience in Information Security.

ُHave experience in Defensive and Offensive Security, Penetration Testing, IPS/IDS evasion techniques, Linux, Computer Networking, Firewalls, WAF, Webfiltering, Next Generation Firewalls, SIEM systems and more.