Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Metasploit Framework Penetration Testing Certification Offer
1 - Introduction to Penetration Testing Using Metasploit
1 - What is a Penetration Test (3:19)
2 - Why Metasploit Framework AKA MSF (5:33)
3 - Importance of Penetration Testing (3:15)
4 - Basics of Penetration Testing (2:18)
5 - Types of Penetration Testing (3:38)
6 - Penetration Testing Execution Standard (5:39)
2 - Setting Up The Laboratory
1 - Requirements ( Like Storage. Processor ) (2:44)
2 - Installing VirtualBox (4:53)
3 - Installing Kali Linux (8:04)
4 - Installing Metasploitable 2 (4:32)
5 - Installing Metasploitable 3 Packer (5:47)
6 - Installing Metasploitable 3 Vagrant and Plugins (4:14)
7 - Installing Metasploitable 3 VM Creation with Vagrant (6:21)
8 - Downloading and Installing Free Windows 7 and Windows 10 (2:57)
9 - Lab Connectivity and Taking Snapshots (2:05)
3 - Meet The Metasploit
1 - Introduction to MSF (1:22)
2 - Evolution of Metasploit (4:18)
3 - Metasploit Filesystem and Libraries (4:31)
4 - The Architecture of MSF (1:43)
5 - Auxiliary Modules (4:36)
6 - Payload Modules (6:00)
7 - Exploit Modules (3:33)
8 - Encoder Modules (2:35)
9 - Post Modules (3:24)
10 - Metasploit Editions (4:02)
11 - Metasploit Community (3:08)
12 - Metasploit Interfaces (4:50)
13 - Armitage (3:16)
14 - MSFconsole (4:53)
15 - MSFConsole Basic Commands 1 (6:44)
16 - MSFConsole Basic Commands 2 (7:59)
17 - MSFConsole Basic Commands 3 (3:32)
18 - Using Databases in MSF 1 (5:42)
19 - Using Databases in MSF 2 (3:14)
20 - More on Exploits in MSF (3:14)
4 - Enumeration
1 - What is Enumeration (2:03)
2 - Nmap Integration and Port Scanning (6:17)
3 - SMB and Samba Enumeration (5:40)
4 - MySQL Enumeration (3:40)
5 - FTP Enumeration (4:15)
6 - SSH Enumeration (2:30)
7 - HTTP Enumeration (6:02)
8 - SNMP Enumeration (3:43)
9 - SMTP Enumeration (3:49)
10 - Using Shodan with MSF (4:58)
5 - Vulnerability Scanning
1 - Intro to Vulnerability Scanning (3:50)
2 - Downloading and Installing Nessus Home (5:42)
3 - Integrating Nessus into MSF (4:40)
4 - Vulnerability Scanning with Nessus Home (6:56)
6 - Exploitation and Gaining Access
1 - Msfconsole Exploit Search & Ranking (3:37)
2 - Metasploit as Exploitation Tool (1:52)
3 - Distributed Ruby Remote Code Execution (drb_remote_codeexec) (3:14)
4 - PHP CGI Argument Injection (php_cgi_arg_injection) (3:08)
5 - MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption (3:55)
6 - Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server) (3:03)
7 - Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce) (3:11)
8 - Sun Oracle GlassFish Server Authenticated Code Execution (glassfish_deployer) (5:38)
9 - Jenkins-CI Script-Console Java Execution (jenkins_script_console) (5:42)
10 - WinRM Script Exec Remote Code Execution (winrm_script_exec) (4:00)
11 - HTTP Writable Path PUT DELETE File Access (http_put) (5:00)
12 - Exploiting Poorly Configured MySQL Service (3:08)
13 - Axis2 SAP Business Objects Authenticated Code Execution via SOAP (4:44)
14 - Using Allports Payload (6:17)
15 - Using Resource Files (6:40)
7 - Post-Exploitation - Meterpreter
1 - Post-Exploitation Meterpreter (2:18)
2 - Meterpreter (3:00)
3 - Basic Meterpreter Commands 1 (6:10)
4 - Basic Meterpreter Commands 2 (3:33)
5 - Basic Meterpreter Commands 3 (4:46)
6 - Privilege Escalation (8:23)
7 - Extracting Password Hashes (4:59)
8 - John the Ripper Module (1:33)
9 - Pass The Hash with Metasploit (5:46)
10 - Token Impersonation (5:44)
11 - Extracting Cleartext Passwords (9:47)
12 - Visual Interaction with the Target (3:47)
13 - Enabling Remote Desktop (5:22)
14 - Searching for Critical Information (5:48)
15 - Packet Sniffing (6:22)
16 - Pivoting (10:02)
17 - Port Forwarding (7:45)
18 - Meterpreter Scripts (4:25)
19 - Meterpreter Python Powershell Extension (8:06)
20 - Maintaining Access (1:58)
21 - Interacting with the Registry (6:37)
22 - Keylogging (7:04)
23 - Meterpreter Backdoor and Persistency Modules (9:34)
8 - Antivirus Evasion and Cleaning
1 - Antivirus Evasion and Cleaning (2:46)
2 - MSFvenom (7:06)
3 - MSFVenom Using Encoders (4:12)
4 - MSFVenom Using Custom Executable Template (5:31)
5 - Using Custom Payload Generators (8:33)
6 - Cleaning Events and Security Management Logs (3:35)
7 - Deceiving File System Using Timestomp (6:06)
Teach online with
6 - Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock