Metasploit Basics for Hackers

Featuring Metasploit 5!

Metasploit is the world's most popular pentesting/hacking framework. Any professional white hat hacker must be proficient in its use.

In this course, the aspiring white hat hacker will gain the skills to become an expert penetration tester using this powerful tool.

For just $500 (those holding the CWA certification get a 30% discount), you can take this course gaining the skills you need to work in this industry and getting the certification to prove it.

 

For More Information, email OTW at; occupytheweb@protonmail.com.

Or

To register, go to our online registration form here.

The complete outline of the course follows below.

     Metasploit Basics for Hackers

 Course Outline

 

I. Introduction to Metasploit

 

II. Metasploit Basics

                a. The Inner Architecture

                b. Keywords

                c. Ways of accessing Metasploit

 

III. Vulnerability Scanning

                a. Scanning with Nexpose

                b. Web App scanning

                c. nmap scanning

 

IV. Exploitation

                a. Exploitation strategy

                b. Attacking the OS

                c. Attacking applications

 

V. The All Powerful Metereter

                a. What is the Meterpreter

                b. What can it do

  

VI. Encoders and Avoiding Detection

                a. msfvenom

                b. Custom Payloads

                c. Obfuscating the payload

            

VII. Client Side attacks

                a. attacking the browser

                b. Adobe attacks

                c. MS Office attacks

                d. Attacking other applications

                e. Java Attacks

                f. PDF attacks

VIII. BeEF and Metasploit

 

VIII.  Auxilliary Modules

                a. Scanning

                b. Reconnaissance

 

IX. Social engineering with Metasploit

                a. Social engineering exploits

                b. SET

 

X. Password Cracking with Metasploit

                a. Metasploit integration with MiTM tools

                b. Integration with password crackers

                c. Psnuffle

                d. Capture Modules

 

XI. Metasploit on Android

                a. Installing Metasploit on Android

                b. Metasploit exploitation from Android