Exploit Development and Execution with the Metasploit Framework

As a security professional learning the ins and outs of exploitation can be challenging. In this course, you'll develop an understanding of how to utilize Metasploit and the assembly language to exploit software applications.
Course info
Rating
(15)
Level
Intermediate
Updated
May 9, 2017
Duration
2h 57m
Table of contents
Description
Course info
Rating
(15)
Level
Intermediate
Updated
May 9, 2017
Duration
2h 57m
Description

As a security professional learning the ins and outs of exploitation can be challenging. In this course, Exploit Development and Execution with the Metasploit Framework, you'll develop an understading of assembly language so you can use it to exploit software applications. First, you'll learn the basics of efficiently using assembly language in practice. Next, you'll be introduced and explore reverse engineering. Finally, you'll discover how to utilize the Metasploit Framework for exploitation. By the end of this course, you'll have an understanding of the basics of exploitation, and will have an idea of how this looks in practice.

About the author
About the author

Gus is an IT expert specialized in programming and security. He's a passionate blogger, geek, and loves what he's doing.

More from the author
More courses by Gus Khawaja
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Gus Khawaja, and welcome to this exciting course of Exploit Development and Execution using the Metasploit Framework. This is not any normal course, in fact this is one of the most difficult subjects that you can encounter in your career as a security professional. I know you want to learn and are curious about exploitation. That's why you're watching this video, right? In this course, we are going to see together how to leverage your knowledge in assembly language so you can use it to exploit software applications. Some of the major topics that we will cover include basics of assembly language, reverse engineering, also you will learn using the Metasploit Framework for exploitation, and much, much more. By the end of this course, you should grasp the basics of exploitation, and we'll give you an idea of how this looks in practice. Before beginning this course, you should be familiar with the essentials of programming and ethical hacking, but don't worry, I will walk you through all the details. I hope you will join me on this journey to learn some exciting stuff with Metasploit.

Fundamentals of Reverse Engineering
Hi, my name is Gus Khawaja, and welcome to this exciting course of Exploit Development using Metasploit. This course will introduce you to the concepts of exploitation. I admit that this is going to be a hard topic, but I will do the best to make it easier and funny, so you can learn how to manipulate the normal behavior of an application. This module will cover a lot of interesting demos to set the fundamentals. First, I will show you how to install an assembly debugger. Then you will learn the basics of an assembly debugger. This is going to be an interesting demo, because you will see visually how a computer interacts at a low level. After that, I will teach you the basics of the amazing assembly language. Next I will show you how the stack works, because you will need a good foundation before you start exploiting the stack. Alright, let's start this amazing course.

Basics of Stack Overflows
Now that you understand the fundamentals of reverse engineering, it's time to start with something more meaningful to exploitation. In this module, we will see together how to smash the stack with our hacking skills, we will outsmart the CPU and the stack normal manipulation to achieve our exploitation in future modules. Are you excited? Wait, but before I start, I hope that you practiced module 1. If you did not, stop now, and go back, and start practicing, and you will thank me later for this advice.

Stack Overflow Exploitation
It's the time to start the fun of exploitation. Hi, this is Gus Khawaja, and in this module, I will show you how to exploit applications vulnerable to stack overflow. I'm assuming that you have watched the previous modules before starting on this one. If not, please go back and check them out. I'm very excited to show you the fun of exploitation. Are you ready? Let's start.

Porting Exploits to the Metasploit Framework
In the previous module, you successfully proved that you could exploit the freefloatftp server. So what's next? In this one, you will import your proof of concept work into Metasploit. In other words, when you port an exploit to Metasploit, means that you convert your existing work, which you developed in Python into the framework itself. Let's start.

Assembly Tricks to Locate Shellcode
You are ready for the next step. In the previous modules, you learned the basics of exploitation and buffer overflow. It's the time to increase the complexity a little bit. In this module, I will show you how to use the knowledge you acquired until now to learn some advanced skills in assembly language and exploitation. If you did not practice the previous modules, then you will find that it's going to be a difficult task to follow through, so I advise you, take your time to go back and start doing some practices. Let's start.