Penetration Testing Fundamentals with the Metasploit Framework

Paths

Penetration Testing Fundamentals with the Metasploit Framework

Authors: Keith Watson, Ricardo Reimao, William Hardy, Kevin Cardwell

The Metasploit Framework is well known as one of the most widely used tools by security professional to assist in a penetration test. A penetration test is one of the most... Read more

What you will learn:

  • Penetration Testing Fundamentals with the Metasploit Framework
  • Metasploit: Getting Started
  • Perform Attacks with Metasploit
  • Post Exploitation with Meterpreter
  • Defense Evasion with Meterpreter

Pre-requisites

Viewers should have a basic knowledge of Network and Security Fundamentals.

Penetration Testing Fundamentals with the Metasploit Framework

Penetration Testing Fundamentals with the Metasploit Framework

Metasploit: Getting Started

by Keith Watson

Sep 4, 2020 / 2h 4m

2h 4m

Start Course
Description

The Metasploit Framework is a very capable exploitation toolkit. It is not an easy tool to quickly understand and utilize effectively. In this course, Metasploit: Getting Started, you’ll learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context. First, you’ll explore the Metasploit Framework architecture, which is key to understanding the framework’s capabilities and inner workings. Next, you’ll discover how to configure the Metasploit Framework for launching an attack. Finally, you’ll learn how to use the Metasploit Framework’s tools for post-exploitation activities once a system has been compromised. When you’re finished with this course, you’ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework.

Table of contents
  1. Course Overview
  2. Penetration Testing Ethics and Processes
  3. Metasploit Framework Capabilities
  4. Metasploit Framework Architecture
  5. Installing and Configuring the Metasploit Framework
  6. Preparing an Attack
  7. Launching an Attack
  8. Working with the Metasploit Framework
  9. Summary and Next Steps

Post Exploitation with Meterpreter

by Ricardo Reimao

Mar 26, 2021 / 1h 41m

1h 41m

Start Course
Description

During a penetration test engagement your job is to exploit the target systems, escalate privileges, create persistence, and exfiltrate data. In this course, Post Exploitation with Meterpreter, you’ll learn to perform all post-exploitation tasks with the Meterpreter tool, which is part of the Metasploit Framework. First, you’ll explore how to initiate a Meterpreter session and the basic Meterpreter shell commands. Next, you’ll discover how to escalate your privileges to gain admin-level access. Then, you’ll learn how to create persistence in the target system. Finally, you will learn how to use the Meterpreter tool to search and exfiltrate sensitive data. When you’re finished with this course, you’ll have the skills and knowledge of post exploitation with Meterpreter needed to perform a complete penetration test.

Table of contents
  1. Course Overview
  2. From Exploitation to Meterpreter Session
  3. Privilege Escalation
  4. Creating Persistence
  5. Searching and Exfiltrating Sensitive Data

Defense Evasion with Meterpreter

by William Hardy

Jun 2, 2021 / 2h 3m

2h 3m

Start Course
Description

The ability to evade defenses is a vital skill for anyone involved in penetration testing or red-teaming engagements in secure environments. In this course, Defense Evasion with Meterpreter, you will learn to customize your Meterpreter tooling to stay under the radar and avoid detection. First, you will explore the inner workings of Metasploit’s Meterpreter payloads and how many endpoint security tools work. Next, you will discover how to slip past signature-based detections on disk and in memory. Finally, you will learn how to defeat emulators and heuristic analysis engines as well as network-based security tools. When you are finished with this course, you will have the skills and knowledge required to conduct security assessments successfully in highly secured networks.

Table of contents
  1. Course Overview
  2. Meterpreter Deep Dive
  3. Antivirus and EDR
  4. Evading Antivirus on Disk
  5. Evading Antivirus Heuristics
  6. Evading Detection in Memory
  7. Evading Detection on the Network
  8. Course Conclusion

Perform Attacks with Metasploit

by Kevin Cardwell

Jul 13, 2021 / 2h 9m

2h 9m

Start Course
Description

Do you want to work as a penetration tester and to gain more experience in using the more advanced features of Metasploit? In this course, Perform Attacks with Metasploit, you’ll learn to follow a systematic approach and leverage weaknesses at the client side and how to apply methods of post exploitation once access has been gained. First, you’ll explore the process of attacking using implanted executable files for access. Next, you’ll discover how to effectively perform post exploitation with the Meterpreter shell payload. Finally, you’ll learn how to interpret the results from the output of the Metasploit toolkit and create the components of a deliverable report. When you’re finished with this course, you’ll have the skills and knowledge of using attacks against a client and methods to extract the information required for a report by performing post exploitation methods and techniques

Table of contents
  1. Course Overview
  2. Demonstrate Client - Side Attacks
  3. Investigating the Meterpreter Payload
  4. Interpret Metasploit Framework Output
Offer Code *
Email * First name * Last name *
Company
Title
Phone
Country *

* Required field

Opt in for the latest promotions and events. You may unsubscribe at any time. Privacy Policy

By providing my phone number to Pluralsight and toggling this feature on, I agree and acknowledge that Pluralsight may use that number to contact me for marketing purposes, including using autodialed or pre-recorded calls and text messages. I understand that consent is not required as a condition of purchase from Pluralsight.

By activating this benefit, you agree to abide by Pluralsight's terms of use and privacy policy.

I agree, activate benefit