top of page

Metasploit Basics for Hackers

Metasploit is one of the world's most powerful exploitation frameworks. Begun as an open-source project by HD Moore, it is now owned by the information security company Rapid7. Every hacker/pentester MUST be proficient in the use of Metasploit.

​

In this section, I will try to provide you with all the skills you need to become a Metasploit expert.

​

If you are new to Metasploit, take a look at these articles from my Metasploit Basics series.

​

Metasploit Basics, Part 1: Getting Started with Metasploit

 

Metasploit Basics, Part 2: Module Types

​

Metasploit Basics, Part 3: Payloads

​

Metasploit Basics, Part 4: Connecting the postgresql database

​

Metasploit Basics, Part 5: Reconnaissance with Metasploit

​

Metasploit Basics, Part 6: The Armitage GUI

​

Metasploit Basics, Part 7: Adding  a Module 

 

Metasploit Basics, Part 8: Exploiting Windows 7 with ETERNALBLUE

 

Metasploit Basics, Part 9: Building Custom Payloads with msfvenom

​

Metasploit Basics, Part 10: Pivoting to Control the Network

​

Metasploit Basics, Part 11: Exploiting  MS Office File Format

​

Metasploit Basics, Part 12: Building RC Scripts

​

Metasploit Basics, Part 13: Exploiting Android Devices

​

Metasploit Basics, Part 14: Updating the msfconsole

​

Metasploit Basics, Part 15: Post Exploitation Fun (Web Cam. Microphone, Passwords, etc)

​

Metasploit Basics, Part 16: Metasploit SCADA Hacking

​

Metasploit Basics, Part 17: Automobile Hacking with Metasploit

​

Metasploit Basics, Part 18: Marrying the Power of Shodan with Metasploit

​

Metasploit Basics, Part 19: Web Delivery for Windows

​

Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials

​

Metasploit Basics, Part 21:Post-Exploitation with mimikatz

​

Metasploit Basics, Part 22:Owning and Controlling the Target System with Momentary Physical Access

​

Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit

​

Metasploit Basics, Part 24: Using the New Evasion Modules in Metasploit 5

​

Metasploit Basics, Part 25: Web Delivery for Linux/UNIX/OSX

​

Metasploit Basics, Part 26: Attacking an Email Server with Metasploit

​

​

In addition, if you want to become a Metasploit Expert, consider attending

our upcoming Metasploit Kung-Fu live online course!

 

You can also purchase videos of OTW's Metasploit Basics for Hackers courses in our online store.

​

Also, look for my upcoming book, "Metasploit5 Basics for Hackers!" This book is yours as part of the MEMBER package.

​

When you feel you have mastered this material, you can validate your skills by taking the Certified Metasploit Expert (MCE) exam.

​

For more information on Metasploit, check out these tutorials.

​

Using psexec with Metasploit

​

How to Make the Meterpreter Persistent

​

Ultimate List of Meterpreter scripts

​

Ultimate List of Meterpreter commands

​

​

​

​

I'll have a whole lot more tutorials on this powerful tool coming soon.

​

​

​

​

​

​

​

bottom of page