top of page

Related Courses

Metasploit for Penetration Testing Video Training Course & PDF Guides Download

Metasploit for Penetration Testing Video Training Course & PDF Guides Download

 

Duration : 5.38 Hours

 

Size: 2.75 GB

 

0 Module 1 - Introduction & Kali Installation -- 0 Part 1.1 - Introduction.mp4

0 Module 1 - Introduction & Kali Installation -- 1 Part 1.2 - Introduction

0 Module 1 - Introduction & Kali Installation -- 2 Part 2 - Kali Installation

1 Module 2 - Metasploit Fundamentals -- 0 Part 1 - Update Kali

1 Module 2 - Metasploit Fundamentals -- 1 Part 2 - Explore Metasploit Structure

1 Module 2 - Metasploit Fundamentals -- 2 Part 3 - Metasploit Database

1 Module 2 - Metasploit Fundamentals -- 3 Part 4 - The msfconsole Interface

1 Module 2 - Metasploit Fundamentals -- 4 Part 5 - Metasploit Payloads & Stagers

1 Module 2 - Metasploit Fundamentals -- 5 Part 6 - Encoders

1 Module 2 - Metasploit Fundamentals -- 6 Part 7 - Database Commands

1 Module 2 - Metasploit Fundamentals -- 7 Part 8.1 - Meterpreter

1 Module 2 - Metasploit Fundamentals -- 8 Part 8.2 - Meterpreter

2 Module 3 - Information Gathering -- 0 Part 1.1 - Scanners

2 Module 3 - Information Gathering -- 1 Part 1.2 - Scanners

2 Module 3 - Information Gathering -- 2 Part 1.3 Scanners

2 Module 3 - Information Gathering -- 3 Part 2 - Discovering Exploits

2 Module 3 - Information Gathering -- 4 Part 3 - Discovering Services

3 Module 4 - Vulnerability Scanning -- 0 Part 1 - Login Attempt

3 Module 4 - Vulnerability Scanning -- 1 Part 2 - VNC Scanner

3 Module 4 - Vulnerability Scanning -- 2 Part 3 - WMAP

3 Module 4 - Vulnerability Scanning -- 3 Part 4 - WMAP Scan

3 Module 4 - Vulnerability Scanning -- 4 Part 5.1 - Nessus

3 Module 4 - Vulnerability Scanning -- 5 Part 5.2 - Nessus

3 Module 4 - Vulnerability Scanning -- 6 Part 5.3 - Nessus

3 Module 4 - Vulnerability Scanning -- 7 Part 5.4 - Nessus

4 Module 5 - Client Side Attacks -- 0 Part 1 - Intro

4 Module 5 - Client Side Attacks -- 1 Part 2 - Generating the Payload

4 Module 5 - Client Side Attacks -- 2 Part 3 - Starting Handler for Reverse Shell

4 Module 5 - Client Side Attacks -- 3 Part 4 - Establishing the Reverse Shell

4 Module 5 - Client Side Attacks -- 4 Part 5 - Windows 7 Reverse Shell

4 Module 5 - Client Side Attacks -- 5 Part 6 - Establishing the Win Shell

5 Module 6 - Post Exploitation -- 0 Part 1 - Explore Meterpreter

5 Module 6 - Post Exploitation -- 1 Part 2 - Screenshot

5 Module 6 - Post Exploitation -- 10 Part 11 - Using the Search Function

5 Module 6 - Post Exploitation -- 2 Part 3 - Privilege Escalation on Win7-32

5 Module 6 - Post Exploitation -- 3 Part 4 - Clearing Windows Event Logs

5 Module 6 - Post Exploitation -- 4 Part 5 - Using Incognito

5 Module 6 - Post Exploitation -- 5 Part 6 - Persistent Backdoor with NetCat

5 Module 6 - Post Exploitation -- 6 Part 7 - Remote Desktop Access with getgui

5 Module 6 - Post Exploitation -- 7 Part 8 - Sniffing the VICTIM_s Packets

5 Module 6 - Post Exploitation -- 8 Part 9 - Port Forwarding

5 Module 6 - Post Exploitation -- 9 Part 10 - Changing File Attributes with Timestomp

6 Module 7 - Maintaining Access -- 0 Part 1 - Keylogging with Keyscan

6 Module 7 - Maintaining Access -- 1 Part 2 - Running Metasploit as a Service

7 Module 8 - Metasploit Extended Usage -- 0 Part 1 - Exploring mimikatz

7 Module 8 - Metasploit Extended Usage -- 1 Part 2 - Embedding Meterpreter in exe

7 Module 8 - Metasploit Extended Usage -- 2 Part 3.1 - File Inclusion Vulnerabilities

7 Module 8 - Metasploit Extended Usage -- 3 Part 3.2 - File Inclusion Vulnerabilities

8 Module 9 - Using the Metasploit GUIs -- 0 Part 1 - Installing Metasploit Community Edition

8 Module 9 - Using the Metasploit GUIs -- 1 Part 2 - Scanning Metasploitable

8 Module 9 - Using the Metasploit GUIs -- 2 Part 3 - Import and Review Nessus Scan

8 Module 9 - Using the Metasploit GUIs -- 3 Part 4 - GUI Overview

8 Module 9 - Using the Metasploit GUIs -- 4 Part 5 - Armitage

8 Module 9 - Using the Metasploit GUIs -- 5 Part 6 - Armitage and Wrap Up

 

 

PDF Guides

 

Beginning Ethical Hacking with Kali Linux_ Computational Techniques for Resolving Security Issues.pdf

Cyber Operations_ Building, Defending, and Attacking Modern Computer Networks.pdf

Metasploit The Penetration Testers Guide by David Kennedy, Jim OGorman, Devon Kearns, Mati Aharoni.pdf

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research by David Maynor.pdf

Metasploit.pdf

Quick Start Guide to Penetration Testing_ With NMAP, OpenVAS and Metasploit.pdf

Wireshark for Security Professionals_ Using Wireshark and the Metasploit Framework.pdf

Metasploit for Penetration Testing Video Training Course & PDF Guides Download

SKU: EXT2021-0052
$4.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page