Metasploit Basics for Hackers

Coming Spring 2020!

Metasploit is one of the world's most powerful exploitation frameworks. Begun as an open-source project by HD Moore, it is now owned by the information security company Rapid7. Every hacker/pentester MUST be proficient in the use of Metasploit.

In this section, I will try to provide you with all the skills you need to become a Metasploit expert.

If you are new to Metasploit, take a look at these articles from my Metasploit Basics series.

Metasploit Basics, Part 1: Getting Started with Metasploit

 

Metasploit Basics, Part 2: Module Types

Metasploit Basics, Part 3: Payloads

Metasploit Basics, Part 4: Connecting the postgresql database

Metasploit Basics, Part 5: Reconnaissance with Metasploit

Metasploit Basics, Part 6: The Armitage GUI

Metasploit Basics, Part 7: Adding  a Module 

 

Metasploit Basics, Part 8: Exploiting Windows 7 with ETERNALBLUE

 

Metasploit Basics, Part 9: Building Custom Payloads with msfvenom

Metasploit Basics, Part 10: Pivoting to Control the Network

Metasploit Basics, Part 11: Exploiting  MS Office File Format

Metasploit Basics, Part 12: Building RC Scripts

Metasploit Basics, Part 13: Exploiting Android Devices

Metasploit Basics, Part 14: Updating the msfconsole

Metasploit Basics, Part 15: Post Exploitation Fun (Web Cam. Microphone, Passwords, etc)

Metasploit Basics, Part 16: Metasploit SCADA Hacking

Metasploit Basics, Part 17: Automobile Hacking with Metasploit

Metasploit Basics, Part 18: Marrying the Power of Shodan with Metasploit

Metasploit Basics, Part 19: Web Delivery for Windows

Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials

Metasploit Basics, Part 21:Post-Exploitation with mimikatz

Metasploit Basics, Part 22:Owning and Controlling the Target System with Momentary Physical Access

Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit

Metasploit Basics, Part 24: Using the New Evasion Modules in Metasploit 5

Metasploit Basics, Part 25: Web Delivery for Linux/UNIX/OSX

In addition, if you want to become a Metasploit Expert, consider attending

our upcoming Metasploit Kung-Fu live online course!

 

You can also purchase videos of OTW's Metasploit Kung-Fu courses here.

Also, look for my upcoming book, "Metasploit Basics for Hackers!"

When you feel you have mastered this material, you can validate your skills by taking the Certified Metasploit Expert (MCE) exam.

For more information on Metasploit, check out these tutorials.

Using psexec with Metasploit

How to Make the Meterpreter Persistent

Ultimate List of Meterpreter scripts

Ultimate List of Meterpreter commands

I'll have a whole lot more tutorials on this powerful tool coming soon.