Expert Metasploit Penetration Testing [Video]

More Information
Learn
  • Use scanning targets and networks for open ports and services
  • Gathering information about the target
  • Use Metasploit to launch remote exploits
  • Attack the target by using client-side exploits in popular applications like browsers
  • Explore the target in the post-exploitation phase
  • Use the powers of Meterpreter
  • Work with Auxiliary modules
  • Operate with Armitage
About

If penetration testing is a battle then Metasploit is the deadliest and stealthiest weapon to use. Metasploit is a free, open source penetration testing framework started by H. D. Moore in 2003, which was later acquired by Rapid7. It is based on a modular architecture and all its modules and scripts are integrated with the framework in the form of modules. This makes it fairly easy to integrate any new custom module with the framework and leverage its functionalities. Metasploit is a feature-rich tool that can be integrated with third party tools easily. It is fast, robust, and extensible, and has the ability to manage multiple targets at a time.

"Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains ad-on tools, such as nmap, Armitage, and so on, that can further add more skill sets in your techniques for penetration testing. Overall the video series covers every nook and corner of Metasploit.

The "Expert Metasploit Penetration Testing" video series starts with the information-gathering phase and advances to complex topics that include the exploitation of targets using remote and client-side attacks, using meterpreter, pivoting, auxiliary modules, and much more. The final section of the series covers Armitage, a GUI-based tool, built over the Metasploit framework.

The video series starts with scanning for vulnerabilities in the target/network, building standalone payloads using msfencode, exploiting operating systems and then moves ahead with client-side exploitation techniques, the Auxiliary module, and so on. In the post-exploitation phase, it covers persistence, the meterpreter, and pivoting. The final section deals with Armitage and explains how it can be used to leverage the powers of Metasploit over a GUI interface.

"Expert Metasploit Penetration Testing" is a quick and comprehensive guide for people who are willing to learn by doing.

"Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real-time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains add-on tools, such as nmap, Armitage, and so on, that can add more penetration testing techniques to your skillset. Overall, the video series covers every aspect of Metasploit.

Features
  • Step-by-step demonstration of the Metasploit framework using real-time examples, diagrams, and presentations for theoretical topics
  • Includes a detailed understanding of the framework internals and how they work
  • Covers all three phases of penetration testing in detail including additional tools, such as Armitage, Nmap, and Nessus
Course Length 1 hour 53 minutes
ISBN 9781782163664
Date Of Publication 20 Dec 2013

Authors

Abhinav Singh

Abhinav Singh is a well-known information security researcher. He is the author of Metasploit Penetration Testing Cookbook (first and second editions) and Instant Wireshark Starter, by Packt. He is an active contributor to the security community—paper publications, articles, and blogs. His work has been quoted in several security and privacy magazines, and digital portals. He is a frequent speaker at eminent international conferences—Black Hat and RSA. His areas of expertise include malware research, reverse engineering, enterprise security, forensics, and cloud security.