Submit Search
Upload
Metasploit.pptx
•
Download as PPTX, PDF
•
0 likes
•
15 views
T
TechnicalShortcuts
Follow
Hacking Metasploit and Ahmyth
Read less
Read more
Technology
Report
Share
Report
Share
1 of 23
Download now
Recommended
security.pptx
security.pptx
TechnicalShortcuts
Learn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Edureka!
Certified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection Systems
frankvv
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Paper id 311201535
Paper id 311201535
IJRAT
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Recommended
security.pptx
security.pptx
TechnicalShortcuts
Learn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Edureka!
Certified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection Systems
frankvv
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Paper id 311201535
Paper id 311201535
IJRAT
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Introduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
Basics of hacking
Basics of hacking
Ali Asghar Jafari Lari
Hacking
Hacking
pranav patade
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
Password cracking and brute force tools
Password cracking and brute force tools
zeus7856
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
The malware (r)evolution
The malware (r)evolution
ITrust - Cybersecurity as a Service
Ethical Hacking
Ethical Hacking
Chetanmalviya8
Summer training in jaipur
Summer training in jaipur
cyber cure
Parag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
Ethical Hacking
Ethical Hacking
aashish2cool4u
How to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
Ethichack 2012
Ethichack 2012
santhosh kumarRG
Portfolio 7
Portfolio 7
Christina Papizzo
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
Spyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
Cse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
Dhams hacking
Dhams hacking
dharmesh ram
hacking basics
hacking basics
dharmesh ram
Data Privacy for Activists
Data Privacy for Activists
Greg Stromire
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
More Related Content
Similar to Metasploit.pptx
Introduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
Basics of hacking
Basics of hacking
Ali Asghar Jafari Lari
Hacking
Hacking
pranav patade
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
MaheshDhope1
Password cracking and brute force tools
Password cracking and brute force tools
zeus7856
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
The malware (r)evolution
The malware (r)evolution
ITrust - Cybersecurity as a Service
Ethical Hacking
Ethical Hacking
Chetanmalviya8
Summer training in jaipur
Summer training in jaipur
cyber cure
Parag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
Ethical Hacking
Ethical Hacking
aashish2cool4u
How to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
Ethichack 2012
Ethichack 2012
santhosh kumarRG
Portfolio 7
Portfolio 7
Christina Papizzo
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
Spyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
Cse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
Dhams hacking
Dhams hacking
dharmesh ram
hacking basics
hacking basics
dharmesh ram
Data Privacy for Activists
Data Privacy for Activists
Greg Stromire
Similar to Metasploit.pptx
(20)
Introduction to Cyber Security
Introduction to Cyber Security
Basics of hacking
Basics of hacking
Hacking
Hacking
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
Password cracking and brute force tools
Password cracking and brute force tools
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
The malware (r)evolution
The malware (r)evolution
Ethical Hacking
Ethical Hacking
Summer training in jaipur
Summer training in jaipur
Parag presentation on ethical hacking
Parag presentation on ethical hacking
Ethical Hacking
Ethical Hacking
How to hack or what is ethical hacking
How to hack or what is ethical hacking
Ethichack 2012
Ethichack 2012
Portfolio 7
Portfolio 7
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Spyware risk it's time to get smart
Spyware risk it's time to get smart
Cse ethical hacking ppt
Cse ethical hacking ppt
Dhams hacking
Dhams hacking
hacking basics
hacking basics
Data Privacy for Activists
Data Privacy for Activists
Recently uploaded
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Recently uploaded
(20)
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Metasploit.pptx
1.
©Prasenjit_Das Hacking When we think
about hacking ! This type of picture comes it our mind A person who gets access to some ones social media accounts , Bank account details etc
2.
©Prasenjit_Das But that’s totally
not the case ! So, What’s hacking and what’s a Hacker then?
3.
©Prasenjit_Das Hacking is the
process of finding some security holes in a computer system or network in order to gain access to personal or corporate information A Hacker is a person who is intensely interested in the mysterious workings of any computer operating system. Hackers are most often programmers
4.
©Prasenjit_Das Types of Hackers There
are various Kinds of hackers! But basically we can categorise them in 3 major divisions Black Hat Hackers White Hat Hackers Gray Hat Hackers
5.
©Prasenjit_Das The Black Hats Cyber Criminals illegal Activities Tend
to harm
6.
©Prasenjit_Das The White Hats Finding Loopholes Ethical Hacking Tend
to help
7.
©Prasenjit_Das Now that you
know about You can guess about! Still no clue? No problem! Lets see what’s on next slide
8.
©Prasenjit_Das The Gray Hats Sometimes Violate
laws Mostly Ethical Tend to Showoff
9.
©Prasenjit_Das Script Kiddy
10.
©Prasenjit_Das Impulsive Attention Seeking Inexperienced Indiscreet Reckless
11.
©Prasenjit_Das Feeling bored After
all theory stuff ? How about some live demo?
12.
©Prasenjit_Das There are
various types of attacks ! Like DDOS, SQL Injection, Phishing etc Today we are going to learn Exploitation
13.
©Prasenjit_Das Exploitation
14.
©Prasenjit_Das An exploit is
a program, or piece of code, designed to find and take advantage of a security flaw or vulnerability in an application or computer system, typically for malicious purposes such as installing malware. An exploit is not malware itself, but rather it is a method used by cybercriminals to deliver malware. Exploit Now lets see some exploitation tools
15.
©Prasenjit_Das 1. SQLMap Used
to automate the process of manual SQL injection over a parameter on a website.
16.
©Prasenjit_Das 2. aircrack-ng It
is an all-in-one packet sniffer, WEP and WPA/WPA2 cracker, analyzing tool, and a hash capturing tool and used for wifi hacking.
17.
©Prasenjit_Das 3. Metasploit Framework
A powerfull tool to test patch installations
18.
©Prasenjit_Das AhMyth Application It
is based on the technology of Metasploit framework. Helps us to create apk payloads
19.
©Prasenjit_Das Before that we
need some prerequisites IP Adress Port Reverse TCP
20.
©Prasenjit_Das Building Payload
21.
©Prasenjit_Das Victim LAB
22.
©Prasenjit_Das Controlling
23.
©Prasenjit_Das Thank You !
Download now