Metasploit Penetration Testing Recipes [Video]

By Lawrence Amer
  • Instant online access to over 8,000+ books and videos
  • Constantly updated with 100+ new titles each month
  • Breadth and depth in over 1,000+ technologies
  1. Preparing the Environment

About this video

Metasploit is a Ruby-based platform for performing advanced penetration testing. It enables you to write, test, and execute exploit code. The Metasploit framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection.

In this course, you'll go through some great recipes that will allow you to build on your existing Metasploit knowledge and start using it effectively. You'll improve your skills with some best practices and techniques and implement some troubleshooting issues you'll encounter using Metasploit. You'll learn to perform intelligence gathering, threat modeling, vulnerability analysis, exploitation, and post-exploitation―all inside Metasploit.

You'll learn to create and customize payloads to evade antivirus software, bypass an organization's defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the Metasploit framework, create your own modules, and much more.

By the end of this course, you'll be proficient with many tools and techniques and will have mastered everything you need to perform penetration testing using Metasploit and virtual machines.

All the code and supporting files are on GitHub at: https://github.com/PacktPublishing/-Metasploit-Penetration-Testing-Recipes

Publication date:
October 2019
Publisher
Packt
Duration
2 hours 5 minutes
ISBN
9781838551865

About the Author

  • Lawrence Amer

    Lawrence Amer is an Offensive Security Certified Professional (OSCP), Certified Penetration Testing Engineer (CPTE), and Vulnerability Researcher; he has reported medium- to severe-level vulnerabilities in eBay, Adobe, Facebook, Sony, Microsoft, Yahoo, and many more. He actively monitors multiple intelligence sources to identify and investigate potential risks and threats. He has been mentioned in various magazines for his zero-days findings. He's also experienced at bypassing most endpoint security solutions, and is especially familiar with malware techniques.

    Browse publications by this author
Book Title
Access this video, plus 8,000 other titles for FREE
Access now