• Course Code:  SL19

  • Term:  Summer 2015

  • Open for Enrollment

  • Self-paced

  • Course Author(s)
    Hitesh Choudhary
Metasploit extreme on kali linux %28lite version%29

Metasploit Extreme on Kali Linux (Lite Version)

Summer 2015

Computer Science

  • 1
    Hitesh Choudhary
    Instructor

Course Summary

 

Metasploit Extreme on Kali Linux (Lite Version)

 

 

 

Metasploit Framework is an open source penetration tool used for developing and executing exploit code against a remote target machine.

Metasploit frame work has the world's largest database of public tested exploits. In simple words, Metasploit can be used to test the vulnerability of computer systems in order to protect them, and on the other hand it can also be used to break into remote systems. It's a powerful tool used for penetration testing.

 

In clear and simple terms, if you are interested in words like Security, Hacking, Exploits etc, then this is the series for you.

 

Chapter 1

 

 Introduction to the Metasploit Series

 About the Instructor

 How to take most out of the series

 

 

Chapter 2

 

 What is Pentesting

 Hats off to HD

 Terminologies and requirement of Metasploit

 Installation of Practice lab

 Getting up to speed quickly with with practicals

 

 

Chapter 3

 

 Metasploit Architecture

 Mixins and Plugins with a touch to Ruby

 

 

Chapter 4

 

 Msfconsole

 Exploits in Metasploit

 Important commands for exploits usage

 Payload Basics

 Generating different payloads

 Database in Metasploit

 Meterpreter in Metasploit

 Meterpreter usage in Metasploit

 

 

Chapter 5

 

 Port scanning with Metasploit

 Service information via Metasploit

 SNMP sniffing

 Custom scanner by user

 

Instructor Biography

 

 

Hitesh Choudhary, Trained as an Electronics Engineer and mastered as computer network and Information Security, is a renowned author, video author, international speaker and security consultant. Also he is trained in wireless security from a prof. of MIT. He created various tools and attacks like wireless Eurynomus featured in Pentest magazine and in Backtrack project. His webinar on wireless, Backtrack, and ethical hacking was attended by 2000+ professionals from Google India, HP, IBM, Accenture, TCS, Sapient Corp. , Symantec, EEL India Ltd., Capgemini, Micro Technology, CDAC, Kodak India Ltd., Wipro Infotech Ltd., ABB Ltd., Tech Mahindra Ltd., and many more. He is also an active consultant and speaker for police in India and Army Intelligence and his work was featured in 20+ air, print and live media.

×
One Last Thing!

Check your email inbox and click on the email verification link we just sent you.

If it doesn’t reach your inbox in a few moments, it might be in your spam folder. Don’t forget to add our email address to your contacts if it did end up in spam! That’ll make sure it doesn’t happen again.

As soon as you’ve verified your email, you’ll be able to continue.


Continue

×

Confirm Payment

Payment Unavailable. Try again later.

Metasploit Extreme on Kali Linux (Lite Version)

Free


Credit Card
PayPal