Companies Home Search Profile

Perform Attacks with Metasploit

Focused View

Kevin Cardwell

2:09:32

83 View
  • perform-attacks-metasploit.zip
  • 1. Course Overview.mp4
    01:35
  • 1. Introduction and Overview.mp4
    07:35
  • 2. Demo - Building Payloads.mp4
    09:37
  • 3. Avoding Detection.mp4
    03:26
  • 4. Demo - Avoiding Detection.mp4
    08:32
  • 5. Identify Client Exploits.mp4
    04:03
  • 6. Demo - Local Attacks.mp4
    08:59
  • 7. Module Summary.mp4
    01:45
  • 1. Introduction and Overview.mp4
    05:04
  • 2. Demo - Power Of Meterpreter.mp4
    08:44
  • 3. Identify Methods Of Persistence.mp4
    01:42
  • 4. Demo - Persistence.mp4
    07:37
  • 5. Extensions.mp4
    03:24
  • 6. Demo - Extensions.mp4
    12:23
  • 7. Module Summary.mp4
    01:09
  • 1. Introduction and Overview.mp4
    06:12
  • 2. Demo - Module Exploration.mp4
    12:15
  • 3. Clarify Exploit Content.mp4
    03:41
  • 4. Demo - Exploit Content.mp4
    06:50
  • 5. Inspect Module Scanners.mp4
    02:30
  • 6. Demo - Module Scanners.mp4
    11:23
  • 7. Module Summary.mp4
    01:06
  • Description


    This course will teach you how to leverage Metasploit, attack targets and gain privileged access using multiple techniques.

    What You'll Learn?


      Do you want to work as a penetration tester and to gain more experience in using the more advanced features of Metasploit? In this course, Perform Attacks with Metasploit, you’ll learn to follow a systematic approach and leverage weaknesses at the client side and how to apply methods of post exploitation once access has been gained. First, you’ll explore the process of attacking using implanted executable files for access. Next, you’ll discover how to effectively perform post exploitation with the Meterpreter shell payload. Finally, you’ll learn how to interpret the results from the output of the Metasploit toolkit and create the components of a deliverable report. When you’re finished with this course, you’ll have the skills and knowledge of using attacks against a client and methods to extract the information required for a report by performing post exploitation methods and techniques

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Kevin Cardwell
    Kevin Cardwell
    Instructor's Courses
    Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 22
    • duration 2:09:32
    • level average
    • English subtitles has
    • Release Date 2023/02/21

    Courses related to Metasploit

    Subtitle
    Post Exploitation with Meterpreter
    Subtitle
    Defense Evasion with Meterpreter