Metasploit Basics for Hackers
Metasploit is one of the world's most powerful exploitation frameworks. Begun as an open-source project by HD Moore, it is now owned by the information security company Rapid7. Every hacker/pentester MUST be proficient in the use of Metasploit.
In this section, I will try to provide you with all the skills you need to become a Metasploit expert.
If you are new to Metasploit, take a look at these articles from my Metasploit Basics series.
Metasploit Basics, Part 1: Getting Started with Metasploit
Metasploit Basics, Part 2: Module Types
Metasploit Basics, Part 3: Payloads
Metasploit Basics, Part 4: Connecting the postgresql database
Metasploit Basics, Part 5: Reconnaissance with Metasploit
Metasploit Basics, Part 6: The Armitage GUI
Metasploit Basics, Part 7: Adding a Module
Metasploit Basics, Part 8: Exploiting Windows 7 with ETERNALBLUE
Metasploit Basics, Part 9: Building Custom Payloads with msfvenom
Metasploit Basics, Part 10: Pivoting to Control the Network
Metasploit Basics, Part 11: Exploiting MS Office File Format
Metasploit Basics, Part 12: Building RC Scripts
Metasploit Basics, Part 13: Exploiting Android Devices
Metasploit Basics, Part 14: Updating the msfconsole
Metasploit Basics, Part 15: Post Exploitation Fun (Web Cam. Microphone, Passwords, etc)
Metasploit Basics, Part 16: Metasploit SCADA Hacking
Metasploit Basics, Part 17: Automobile Hacking with Metasploit
Metasploit Basics, Part 18: Marrying the Power of Shodan with Metasploit
Metasploit Basics, Part 19: Web Delivery for Windows
Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials
Metasploit Basics, Part 21:Post-Exploitation with mimikatz
Metasploit Basics, Part 22:Owning and Controlling the Target System with Momentary Physical Access
Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
Metasploit Basics, Part 24: Using the New Evasion Modules in Metasploit 5
Metasploit Basics, Part 25: Web Delivery for Linux/UNIX/OSX
In addition, if you want to become a Metasploit Expert, consider attending
our upcoming Metasploit Kung-Fu live online course!
You can also purchase videos of OTW's Metasploit Basics for Hackers courses in our online store.
Also, look for my upcoming book, "Metasploit5 Basics for Hackers!" This book is yours as part of the MEMBER package.
When you feel you have mastered this material, you can validate your skills by taking the Certified Metasploit Expert (MCE) exam.
For more information on Metasploit, check out these tutorials.
How to Make the Meterpreter Persistent
Ultimate List of Meterpreter scripts
Ultimate List of Meterpreter commands
I'll have a whole lot more tutorials on this powerful tool coming soon.
Coming Fall 2020!
