Metasploit Framework course overview
Host & Network Penetration Testing: **The Metasploit Framework (MSF)**
Metasploit Framework Overview
- Introduction to the Metasploit Framework 13m 59s
- Metasploit Framework Architecture 19m 36s
- Penetration Testing With The Metasploit Framework 6m 54s
Metasploit Fundamentals
- Installing & Configuring The Metasploit Framework 10m 54s
- MSFconsole Fundamentals 24m 54s
- Creating & Managing Workspaces 8m 50s
Information Gathering & Enumeration
Nmap
- Port Scanning & Enumeration With Nmap 9m 32s
- Windows Recon: Nmap Host Discovery Cyber Security
- Importing Nmap Scan Results Into MSF 7m 16s
Enumeration
- Port Scanning With Auxiliary Modules 23m 24s
- FTP Enumeration 17m 55s
- SMB Enumeration 17m 49s
- Web Server Enumeration 32m 34s
- MySQL Enumeration 21m 34s
- SSH Enumeration 13m 23s
- SMTP Enumeration 8m 26s Postfix Recon
Vulnerability Scanning
- Vulnerability Scanning With MSF 31m 4s
Nessus
- Vulnerability Scanning With Nessus 28m 57s
Web Apps
- Web App Vulnerability Scanning With WMAP 22m 23s
Client-Side Attacks
Payloads
- Generating Payloads With Msfvenom 30m 32s
- Encoding Payloads With Msfvenom 15m 32s
- Injecting Payloads Into Windows Portable Executables 11m 2s
Automating
- Automating Metasploit With Resource Scripts 16m 26s
Exploitation
Windows Exploitation
- Exploiting A Vulnerable HTTP File Server 11m 59s
- Exploiting Windows MS17-010 SMB Vulnerability 14m 6s
- Exploiting WinRM (Windows Remote Management Protocol) 17m 48s
- Exploiting A Vulnerable Apache Tomcat Web Server 19m 34s
- Windows: Java Web Server Cyber Security
Linux Exploitation
- Exploiting A Vulnerable FTP Server 11m 52s
- Exploiting Samba 11m 32s
- Exploiting A Vulnerable SSH Server 9m 45s
- Exploiting A Vulnerable SMTP Server 10m 1s
Post Exploitation Fundamentals
- Meterpreter Fundamentals 30m 22s
- Upgrading Command Shells To Meterpreter Shells 9m 38s
Windows Post Exploitation
- Windows Post Exploitation Modules 31m 22s
- Windows Privilege Escalation: Bypassing UAC 16m 16s
- UAC Bypass: Memory Injection (Metasploit) Cyber Security
- Windows Privilege Escalation:Token Impersonation With Incognito 19m 40s
Privilege Escalation: Impersonate Cyber Security
- Dumping Hashes With Mimikatz 16m 39s
- Windows: Meterpreter: Kiwi Extension Cyber Security
- Pass-the-Hash With PSExec 10m 51s
- Exploiting SMB With PsExec Cyber Security
- Establishing Persistence On Windows 14m 42s
- Maintaining Access: Persistence Service Cyber Security
- Enabling RDP 13m 19s
- Windows Keylogging 10m 2s
- Windows: File and Keylogging Cyber Security
- Clearing Windows Event Logs 11m 13
Linux Post Exploitation
- Linux Post Exploitation Modules 24m 6s
- Linux Privilege Escalation: Exploiting A Vulnerable Program 14m 24s
- Privilege Escalation - Rootkit Scanner Cyber Security
- Dumping Hashes With Hashdump 14m 26s
- Establishing Persistence On Linux 27m 56s
Armitage
- Metasploit GUIs
- Port Scanning & Enumeration With Armitage 20m 38s
- Exploitation & Post Exploitation With Armitage 24m 18s
Comments
Post a Comment