Learning Metasploit [Video]

Preview in Mapt
Code Files

Learning Metasploit [Video]

Sagar Rahalkar

An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client-side attacks and anti-forensics
Mapt Subscription
FREE
$29.99/m after trial
Video
$106.25
RRP $124.99
Save 14%
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$106.25
$29.99 p/m after trial
RRP $124.99
Subscription
Video
Start 14 Day Trial

Frequently bought together


Learning Metasploit [Video] Book Cover
Learning Metasploit [Video]
$ 124.99
$ 106.25
Machine Learning for OpenCV – Advanced Methods and Deep Learning [Video] Book Cover
Machine Learning for OpenCV – Advanced Methods and Deep Learning [Video]
$ 124.99
$ 106.25
Buy 2 for $35.00
Save $214.98
Add to Cart

Video Details

ISBN 139781788628396
Course Length2 hours and 17 minutes

Video Description

This course will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components used by Metasploit. Further, in the video, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools. Next, you'll get hands-on experience carrying out client-side attacks. Moving on, you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post-compromise. This video will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. By the end of this course, you'll get the hang of bypassing different defences, after which you'll learn how hackers use the network to gain access to different systems.

Style and Approach

This tutorial is packed with step-by-step instructions that are useful for those getting started with Metasploit. This is an easy-to-read guide to learning Metasploit from scratch that explains simply and clearly all you need to know to use this essential IT power tool.

Table of Contents

Introduction to Metasploit and Supporting Tools
The Course Overview
Exploring Metasploit
Effective and Powerful Supplementary Tools
Setting Up Your Environment
Using the Kali Linux Virtual Machine
Installation
Setting Up Exploitable Targets in a Virtual Environment
Metasploit Components and Environment Configuration
Structure and Components of Metasploit
Playing Around with msfconsole
Variables and Updating the Metasploit
Information Gathering with Metasploit
Information Gathering and Enumeration
Advance Features in Metasploit
Vulnerability Hunting with Metasploit
Nmap
Managing the Database
Nessus
Client-Side Attacks with Metasploit
Need of Client-Side Attacks
The msfvenom Utility
Social Engineering with Metasploit
Web Application Scanning with Metasploit
Setting Up a Vulnerable Application
Web Application Scanning Using WMAP
Metasploit Auxiliaries for Web Application Enumeration and Scanning
Antivirus Evasion and Anti-Forensics
Using Encoders to Avoid AV Detection
Anti-Forensics
Cyber Attack Management with Armitage
Armitage Console
Scanning and Enumeration
Find and Launch Attacks
Extending Metasploit and Exploit Development
Exploit Development Concepts
Exploit Templates and Mixins
Adding External Exploits to Metasploit

What You Will Learn

  • Get to know the absolute basics of the Metasploit framework so you have a strong foundation for advanced attacks.
  • Integrate and use various supporting tools to make Metasploit even more powerful and precise.
  • Set up the Metasploit environment along with your own virtual testing lab.
  • Use Metasploit for information gathering and enumeration before planning the blueprint for the attack on the target system.
  • Get your hands dirty by firing up Metasploit in your own virtual lab and hunt down real vulnerabilities.
  • Discover the clever features of the Metasploit framework for launching sophisticated and deceptive client-side attacks that bypass the perimeter security.
  • Leverage Metasploit capabilities to perform Web application security scanning.

Authors

Table of Contents

Introduction to Metasploit and Supporting Tools
The Course Overview
Exploring Metasploit
Effective and Powerful Supplementary Tools
Setting Up Your Environment
Using the Kali Linux Virtual Machine
Installation
Setting Up Exploitable Targets in a Virtual Environment
Metasploit Components and Environment Configuration
Structure and Components of Metasploit
Playing Around with msfconsole
Variables and Updating the Metasploit
Information Gathering with Metasploit
Information Gathering and Enumeration
Advance Features in Metasploit
Vulnerability Hunting with Metasploit
Nmap
Managing the Database
Nessus
Client-Side Attacks with Metasploit
Need of Client-Side Attacks
The msfvenom Utility
Social Engineering with Metasploit
Web Application Scanning with Metasploit
Setting Up a Vulnerable Application
Web Application Scanning Using WMAP
Metasploit Auxiliaries for Web Application Enumeration and Scanning
Antivirus Evasion and Anti-Forensics
Using Encoders to Avoid AV Detection
Anti-Forensics
Cyber Attack Management with Armitage
Armitage Console
Scanning and Enumeration
Find and Launch Attacks
Extending Metasploit and Exploit Development
Exploit Development Concepts
Exploit Templates and Mixins
Adding External Exploits to Metasploit

Video Details

ISBN 139781788628396
Course Length2 hours and 17 minutes
Read More

Read More Reviews

Recommended for You

Machine Learning for OpenCV – Advanced Methods and Deep Learning [Video] Book Cover
Machine Learning for OpenCV – Advanced Methods and Deep Learning [Video]
$ 124.99
$ 106.25
Machine Learning for OpenCV - Supervised Learning [Video] Book Cover
Machine Learning for OpenCV - Supervised Learning [Video]
$ 124.99
$ 106.25
Apache Kafka Series - Learn Apache Kafka for Beginners [Video] Book Cover
Apache Kafka Series - Learn Apache Kafka for Beginners [Video]
$ 47.99
$ 40.80
Learn Azure Storage SDK [Video] Book Cover
Learn Azure Storage SDK [Video]
$ 124.99
$ 106.25
Unsupervised Machine Learning Projects with R [Video] Book Cover
Unsupervised Machine Learning Projects with R [Video]
$ 124.99
$ 106.25
Deep Learning with PyTorch [Video] Book Cover
Deep Learning with PyTorch [Video]
$ 124.99
$ 106.25