The course syllabus of our course in metasploit from novice to Ninja advanced skills.
If you are a penetration tester, network/system administrator or even novice finding your way into ethical hacking >> this course is for you.
2. Security Scope
Organization that seeks to share information
security awakening in Cyber-Space through
teaching skills of Ethical-Hacking and
Penetration-Testing
Our Sponsor
http://Securityking1.com
SecurityScope
3. About The Instructor
• Name :
Mustafa Abdel-sallam
• Job title :
CEO / Co-founder of Security Scope Organization
Cyber-Sec Dep. Head at Source Valley
• About:
Mustafa has more than 4 years experience in Information Security Training
His skills includes:
Python, C/C++, Ruby, Bash
Network administration
Penetration Testing
SecurityScope
4. Course Modules
Introduction to Metasploit and Setup lab
What is Metasploit Framework
Installing Metasploit on Windows
Installing Metasploit on Linux
Using Virtual Machines
Remote Access Metasploit Through SSH
Metasploit fundamentals
Metasploit Architecture
Metasploit Directories
Metasploit Interfaces
Metasploit Commands Basics
Metasploit Database
SecurityScope
5. SecurityScope
Information Gathering
What is Foot-printing and Reconnaissance
How to Gather Information
Information Gathering Techniques with Metasploit
Integrate Metasploit With External Tools
Scanning
What is Scanning ?
Scanning Phases
Network Scanning
Port Scanning
Vulnerability Scanning
Exploitation Show and System Hacking
• Searching for Valid Exploit
• How to Exploit
• Exploit System-Based Vulnerabilities
• Understanding Metaploit Payloads and Sessions
• Exploiting Multiple OS
• Client Side Attacks
• Some of Post Exploitation Modules
• Deep Diving into Metasploit Exploitation Modules
6. After Hacking
• What is Post Exploitation
• Colleting Data
• Deep Diving into Windows Post Exploitation
• Privilege Escalation
• Maintaining Access with Metasploit Persistence
• Metasploit Pivoting
• Clearing System Logs
Metasploit Backdoors
• Introduction to MSFVenom
• Generating Binary Payloads With MSFVenom
• Windows OS Backdoors
• Mining and Wrapping With MSFVenom
• Linux OS Backdoors
• Android OS Backdoors
• Generating Binary Payloads With MsfConsole
SecurityScope
7. Meterpreter Post Exploitation Modules
Android Post Exploitation
Persistence Android Backdoor
Linux Post Exploitation
Persistence Linux Backdoor
Metasploit in WEB Applications Attacks
Integrate Metasploit With BeEF XSS Frame Work
Browser AutoPwn Auxiliary
Exploiting XSS With Metasploit
Generating PHP Backdoor With MSFVenom
Exploiting Remote File Inclusion With Metasploit
Exploiting Command Execution With Metasploit
SecurityScope
8. Avoid AV, IDs and Firewalls
How Does AVs, Firewalls and IDs Work
How Reverse Connections Bypasses The Detections
How to Bypass AV
Automated tools to Avoid AV Detections
Manually Avoid AV Detections
Metasploit Tools and Scripts
Metasploit tools
Metasploit Resource Scripts
Make Your Own Metasploit Resource Scripts
Using External Tools With Metasploit
BeEF XSS (detailed)
SET Toolkit
Ettercap
SecurityScope
9. Metasploit GUIs
Using MSFWeb
Using Armitage
Adding Armitage Custom Features by Cortana Script
Using Exploits Outside Metasploit
Exploit-DB
Generating Shell code with MSFVenom
Downloading The Whole Exploit-DB on Your Local Computer
End of The Course
• Metasploit Summary
• Some Things You Need to Know
• Where to go from here
• Recommended Books To Read
• Metasploit Commands Cheat Sheet
SecurityScope