Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn The Metasploit Framework Inside Out
1 Introduction And Environment Setup
1.1 Course Introduction (3:42)
1.2 Introduction To Metasploit And The PTES (3:12)
1.3 Setting Up, Updating The Metasploit Framework And Other Metasploit Variants (12:36)
1.4 The Metasploit Filesystem And Modules (5:26)
1.5 Installing The Metasploitable3 Virtual Machine (10:41)
1.6 The Metasploit Unleashed Reference (1:43)
2 Metasploit Fundamentals
2.1 Msfconsole Introduction And Its Core Commands (9:30)
2.2 Metasploit Exploit Usage (6:37)
2.3 Payloads And Their Settings, Getting Our First Meterpreter Shell (7:58)
2.4 Meterpreter Commands (6:06)
2.5 Msfvenom Payload Generation (7:23)
2.6 Resource Scripts And Database Backend Commands (7:40)
3 Information Gathering With Metasploit
3.1 Introduction To Information Gathering (1:37)
3.2 Port Scanning With db_nmap (5:16)
3.3 Gathering Information Manually (10:03)
4 Vulnerability Assessment
4.1 Installing The Nessus Community Edition, Loading It Within Metasploit (4:31)
4.2 Scanning For Vulnerabilities With Nesuss And Saving The Results In Metasploit (12:01)
4.3 Scanning Web Applications With The Metasploit Auxiliary Modules (8:56)
5 Exploitation Of Services
5.1 Introduction To Exploitation (4:23)
5.2 Three Ways To Exploit The Tomcat Server (11:24)
5.3 Exploiting ManageEngine, ElasticSearch And Ruby On Rails (3:14)
5.4 Exploiting WebDav And Wordpress On WAMP (5:40)
5.5 Exploiting Port 445 With Psexec And Eternal Blue (2:47)
6 Exploitation Via Social Engineering
6.1 Introduction To Social Engineering (1:01)
6.2 Generating Payloads To Connect To Remote Machines Over The Internet (8:45)
6.3 Trojanizing An Executable With Msfvenom (5:12)
6.4 Trojanizer (8:17)
6.5 Social Engineering With Beef-XSS And Metasploit (4:48)
6.6 Antivirus Evasion Techniques (5:41)
6.7 Higher Antivirus Evasion Success Rates With The Veil Framework (4:37)
7 Post-Exploitation
7.1 Monitoring The User's Screen, Keyboard And Killing The Antivirus (4:44)
7.2 Enabling Remote Desktop (2:40)
7.3 Privilege Escalation: Basic Enumeration (5:12)
7.4 Privilege Escalation: Getting The User's Password And Going Deeper (9:46)
7.5 Cracking Found Password Hashes (1:55)
7.6 Using Meterpreter To Create A Persistent Backdoor (2:43)
7.7 Cleaning Up After Yourself (8:11)
8 Conclusion
8.1 The End? (1:15)
Teach online with
5.4 Exploiting WebDav And Wordpress On WAMP
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock