Introducing Metasploit for White Hat Penetration Testing
Installing and Configuring Metasploit
Scanning the Network
Gaining Access to Systems
Maintaining and Expanding Metasploit
Jun 16, 2016
Metasploit is one of the most widely used tools for penetration testing, providing powerful attack simulations, security assessment management, and more. In this course, Introduction to Penetration Testing Using Metasploit, you'll learn to use Metasploit to enumerate available services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. First, you'll see how to install and configure the Metasploit Framework and several supporting tools on Kali Linux. Next, you'll explore how exploits and payloads work together to gain access to systems. Finally, you'll look at how Metasploit Framework releases are made available and how to maintain the latest version of the Framework. By the end of this course, you'll have a better understanding of how to use Metasploit to quickly assess the security posture of systems and networks to reduce risk.
Course Overview Hello! My name is Keith Watson, and I'm excited to start you on a path to developing penetration testing skills with my course, Introduction to Penetration Testing Using Metasploit. Penetration testing is a method of validating the security of an organization's network or discovering those minor weaknesses that lead to big compromises. It requires out-of-the-box thinking and detective work using an attacker's mindset and a toolbox of powerful tools. It's also quite a rush when you pop a shell on a supposedly secure system. In this course, we're going to explore the processes and techniques around penetration testing with emphasis on the Metasploit Framework and its suite of scanners, exploits, payloads, and post-exploitation tools. Some of the major topics covered include ethical considerations in the use of penetration testing tools, creating a penetration testing environment using Kali Linux, vulnerability information gathering and analysis, configuring payloads and launching exploits, and using post-exploitation tools and techniques. By the end of this course, you'll be familiar with the Metasploit Framework console and how to exploit network service vulnerabilities in target systems. Before beginning the course, you should be familiar with TCP/IP network concepts and have some experience using Linux. From here, you should feel comfortable diving into other penetration testing courses in the Pluralsight library. I hope you'll join me on this journey to learn penetration testing and the Metasploit Framework with the Introduction to Penetration Testing Using Metasploit here at Pluralsight