• Classroom
Course Description

This course is designed to cover Metasploit from the ground up. Note there is some overlap between this course and the general hacking course that we offer. The general hacking will do some limited Kali and Metasploit.

Learning Objectives

Introduction to Linux (optional)

Linux history
Linux file structure and directories
Linux shall commands

Ls, cd, ps, pstree, top, touch, grep, mkdir, apt-get, cat, dmesg, find,

Introduction to Kali

Setting up Kali
Recon-ng
Wi-Fi honey
Hashcat
Macchanger
Ghost phisher
Sparta
John the ripper
Dmitry

Metasploit fundamentals

Metasploit structure
Basic Metasploit commands
Metasploit scans (SSH, FTP, SMB, DNS, SQL Server, nmap)

Basic attacks (this begins with easy attacks that are very likely to work, and are against easy targets)

At least 8 different attacks against less secure Windows variants are explored.
In depth discussion of why these attacks work and how they work
How to find exploits

More with Metasploit

Leaning to use msfvenom
Attacking more secure Windows variants (i.e. patched and firewalled)
Attacking Linux boxes
Attacking Android

Advanced Metasploit

Anti-virus avoidance techniques
Firewill evasion techniques
Moving through a router
Pivoting

Framework Connections