Pentesting and Hacking with Metasploit

Welcome to Pentesting and Hacking with Metasploit course

in this course we are going to explain how to use metasploit in pentesting and hacking.

Memberships can access this course for free.

This course will teach you:

in this course we are going to explain to you how to hack and pentest with metasploit we are going to see scanning,client side attacks,remote attacks,after hacking,and we are going to execute advanced attacks inside the victim network and hack other hosts

You will Need:

You are going to need kali linux.

Course Modules:

This course consists of five modules:

Short Summery

In the first module: you are going to be introduced to metasploit, what should you do at the first run ,and how to use metasploit tools.

In the second module: you are going to see how to search for exploits and execute different client side attacks and hack the operating system.

In the third module: you are going to see how scan the hosts for vulnerabilities and execute a remote attacks.

In the fourth module: you are going to see what can you do after hacking the operating system.

In the fifth module: you are going to see how to execute advanced attacks inside the victim's network ,discover other networks,and how to hack the others hosts in these networks.

Course syllabus:

    • Module 1: Introduction to Metasploit
    • What is Metasploit ?
    • Getting started with MSF
      • Connecting database
      • Creating a workspace
    • How to use Metasploit tools
      • msfconsole
      • msfvenom
    • Module 2: Client Side Attacks
    • Searching for exploit
    • Compromise the host using PDF file.
    • Microsoft office VBScript infection.
    • Compromising using payload.
    • Module 3: Remote Attacks
    • Scanning the target host.
    • Searching for vulnerabilities.
    • Exploitation.
    • Module 4: Post exploitation
    • What can we do with the victim ?
    • Basic procedures.
    • More procedures.
    • Module 5: Maneuver
    • Scanning the victim network
    • Discovering the connected networks to the victim host
    • Hosts discovery
    • Routing the traffic
    • Port scanning
    • Port forwarding
    • Vulnerability exploitation

Course Contents

Materials Access

Course Certificate

Price: 219$

Purchase