Advance Metasploit

Learn Advance Usage of Metasploit Framework

This course is based on the widely popular open-source tool Metasploit. The course is aimed at teaching participants the advance usage of Metasploit framework, going many steps ahead than simply "point-click-exploit". It will train participants in using the varied "modules" included in Metasploit and how to efficiently use them to exploit vulnerabilities. Database hacking and real-world attack scenarios using Metasploit will be demonstrated. Finally, the participants will also learn the steps needed to create and add their own exploits to the Metasploit Framework.

Objectives of the course

Upon completion of this course, participants will be able to:

  • Understand the Metasploit Exploitation Framework
  • Understand Advance exploitation using Metasploit
  • Extend the Metasploit framework with custom exploit/modules

Who should attend this training?

  • Security Enthusiasts who wish to understand security from the "attacker’s seat"
  • Security Professionals looking to enhance their skills in ‘pen-test’ with advance usage of Metasploit

Skill Pre-requisites

  • Basic knowledge about information security
  • Depth- knowledge in networks (TCP/IP)
  • Familiar with command line interface

Course Duration

  • 2 Days

Course Contents

  • Module 1: Metasploit Fundamentals
    • Module 1.1: Exploit
    • Module 1.2: Payloads
    • Module 1.3: Auxillary
  • Module 2: Network Reconnaissance with Metasploit
  • Module 3: Metasploit Payload
  • Module 4: Meterpreter and Post Exploitation
  • Module 5: Client-side Exploitation
    • Module 5.1: Browser
    • Module 5.2: PDF
    • Module 5.3: EXE
  • Module 6:  Advance MSF Usage
    • Module 6.1: Pass-the-Hash
    • Module 6.2: DB_Autopwn
    • Module 6.3: Importing Nmap/Nessus XML
  • Module 7: Metasploit Add-ons
    • Module 7.1: Armitage
    • Module 7.2: SET
    • Module 7.2: Fast-track
  • Module 8: Fuzzing with Metasploit
  • Module 9: Porting Exploits to Metasploits

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content