Metasploit Basics for Hackers

Featuring Metasploit 5!

Metasploit is the world's most popular pentesting/hacking framework. Any professional white-hat hacker must be proficient in its use.

In this course, the aspiring white-hat hacker will gain the skills to become an expert penetration tester using this powerful tool.

Become a Subscriber and you can take this course gaining the skills you need to work in this industry and get the certification (MCE at to prove it.


For More Information, email OTW at;


To register, go to our online registration form here.

The complete outline of the course follows below.

     Metasploit Basics for Hackers

 Course Outline


I. Introduction to Metasploit


II. Metasploit Basics

                a. The Inner Architecture

                b. Keywords

                c. Ways of accessing Metasploit


III. Vulnerability Scanning

                a. Scanning with Nexpose

                b. Web App scanning

                c. nmap scanning


IV. Exploitation

                a. Exploitation strategy

                b. Attacking the OS

                c. Attacking applications


V. The All Powerful Metereter

                a. What is the Meterpreter

                b. What can it do


VI. Encoders and Avoiding Detection

                a. msfvenom

                b. Custom Payloads

                c. Obfuscating the payload


VII. Client Side attacks

                a. attacking the browser

                b. Adobe attacks

                c. MS Office attacks

                d. Attacking other applications

                e. Java Attacks

                f. PDF attacks

VIII. BeEF and Metasploit


VIII.  Auxilliary Modules

                a. Scanning

                b. Reconnaissance


IX. Social engineering with Metasploit

                a. Social engineering exploits

                b. SET


X. Password Cracking with Metasploit

                a. Metasploit integration with MiTM tools

                b. Integration with password crackers

                c. Psnuffle

                d. Capture Modules


XI. Metasploit on Android

                a. Installing Metasploit on Android

                b. Metasploit exploitation from Android