Metasploit Basics for Hackers
Metasploit is one of the world's most powerful exploitation frameworks. Begun as an open-source project by HD Moore, it is now owned by the information security company Rapid7. Every hacker/pentester MUST be proficient in the use of Metasploit.
​
In this section, I will try to provide you with all the skills you need to become a Metasploit expert.
​
If you are new to Metasploit, take a look at these articles from my Metasploit Basics series.
​
Metasploit Basics, Part 1: Getting Started with Metasploit
Metasploit Basics, Part 2: Module Types
​
Metasploit Basics, Part 3: Payloads
​
Metasploit Basics, Part 4: Connecting the postgresql database
​
Metasploit Basics, Part 5: Reconnaissance with Metasploit
​
Metasploit Basics, Part 6: The Armitage GUI
​
Metasploit Basics, Part 7: Adding a Module
Metasploit Basics, Part 8: Exploiting Windows 7 with ETERNALBLUE
Metasploit Basics, Part 9: Building Custom Payloads with msfvenom
​
Metasploit Basics, Part 10: Pivoting to Control the Network
​
Metasploit Basics, Part 11: Exploiting MS Office File Format
​
Metasploit Basics, Part 12: Building RC Scripts
​
Metasploit Basics, Part 13: Exploiting Android Devices
​
Metasploit Basics, Part 14: Updating the msfconsole
​
Metasploit Basics, Part 15: Post Exploitation Fun (Web Cam. Microphone, Passwords, etc)
​
Metasploit Basics, Part 16: Metasploit SCADA Hacking
​
Metasploit Basics, Part 17: Automobile Hacking with Metasploit
​
Metasploit Basics, Part 18: Marrying the Power of Shodan with Metasploit
​
Metasploit Basics, Part 19: Web Delivery for Windows
​
Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials
​
Metasploit Basics, Part 21:Post-Exploitation with mimikatz
​
Metasploit Basics, Part 22:Owning and Controlling the Target System with Momentary Physical Access
​
Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
​
Metasploit Basics, Part 24: Using the New Evasion Modules in Metasploit 5
​
Metasploit Basics, Part 25: Web Delivery for Linux/UNIX/OSX
​
Metasploit Basics, Part 26: Attacking an Email Server with Metasploit
​
​
In addition, if you want to become a Metasploit Expert, consider attending
our upcoming Metasploit Kung-Fu live online course!
You can also purchase videos of OTW's Metasploit Basics for Hackers courses in our online store.
​
Also, look for my upcoming book, "Metasploit5 Basics for Hackers!" This book is yours as part of the MEMBER package.
​
When you feel you have mastered this material, you can validate your skills by taking the Certified Metasploit Expert (MCE) exam.
​
For more information on Metasploit, check out these tutorials.
​
​
How to Make the Meterpreter Persistent
​
Ultimate List of Meterpreter scripts
​
Ultimate List of Meterpreter commands
​
​
​
I'll have a whole lot more tutorials on this powerful tool coming soon.
​
​
​
​
​
​
​