Metasploit Framework
for Ninja
Course Syllabus
Security Scope
Security Scope
Organization that seeks to share information
security awakening in Cyber-Space through
teaching skills of Ethical-Hacking and
Penetration-Testing
Our Sponsor
http://Securityking1.com
SecurityScope
About The Instructor
• Name :
Mustafa Abdel-sallam
• Job title :
CEO / Co-founder of Security Scope Organization
Cyber-Sec Dep. Head at Source Valley
• About:
Mustafa has more than 4 years experience in Information Security Training
His skills includes:
 Python, C/C++, Ruby, Bash
 Network administration
 Penetration Testing
SecurityScope
Course Modules
 Introduction to Metasploit and Setup lab
 What is Metasploit Framework
 Installing Metasploit on Windows
 Installing Metasploit on Linux
 Using Virtual Machines
 Remote Access Metasploit Through SSH
 Metasploit fundamentals
 Metasploit Architecture
 Metasploit Directories
 Metasploit Interfaces
 Metasploit Commands Basics
 Metasploit Database
SecurityScope
SecurityScope
 Information Gathering
 What is Foot-printing and Reconnaissance
 How to Gather Information
 Information Gathering Techniques with Metasploit
 Integrate Metasploit With External Tools
 Scanning
 What is Scanning ?
 Scanning Phases
 Network Scanning
 Port Scanning
 Vulnerability Scanning
 Exploitation Show and System Hacking
• Searching for Valid Exploit
• How to Exploit
• Exploit System-Based Vulnerabilities
• Understanding Metaploit Payloads and Sessions
• Exploiting Multiple OS
• Client Side Attacks
• Some of Post Exploitation Modules
• Deep Diving into Metasploit Exploitation Modules
 After Hacking
• What is Post Exploitation
• Colleting Data
• Deep Diving into Windows Post Exploitation
• Privilege Escalation
• Maintaining Access with Metasploit Persistence
• Metasploit Pivoting
• Clearing System Logs
Metasploit Backdoors
• Introduction to MSFVenom
• Generating Binary Payloads With MSFVenom
• Windows OS Backdoors
• Mining and Wrapping With MSFVenom
• Linux OS Backdoors
• Android OS Backdoors
• Generating Binary Payloads With MsfConsole
SecurityScope
 Meterpreter Post Exploitation Modules
 Android Post Exploitation
 Persistence Android Backdoor
 Linux Post Exploitation
 Persistence Linux Backdoor
 Metasploit in WEB Applications Attacks
 Integrate Metasploit With BeEF XSS Frame Work
 Browser AutoPwn Auxiliary
 Exploiting XSS With Metasploit
 Generating PHP Backdoor With MSFVenom
 Exploiting Remote File Inclusion With Metasploit
 Exploiting Command Execution With Metasploit
SecurityScope
 Avoid AV, IDs and Firewalls
 How Does AVs, Firewalls and IDs Work
 How Reverse Connections Bypasses The Detections
 How to Bypass AV
 Automated tools to Avoid AV Detections
 Manually Avoid AV Detections
 Metasploit Tools and Scripts
 Metasploit tools
 Metasploit Resource Scripts
 Make Your Own Metasploit Resource Scripts
 Using External Tools With Metasploit
 BeEF XSS (detailed)
 SET Toolkit
 Ettercap
SecurityScope
 Metasploit GUIs
 Using MSFWeb
 Using Armitage
 Adding Armitage Custom Features by Cortana Script
 Using Exploits Outside Metasploit
 Exploit-DB
 Generating Shell code with MSFVenom
 Downloading The Whole Exploit-DB on Your Local Computer
 End of The Course
• Metasploit Summary
• Some Things You Need to Know
• Where to go from here
• Recommended Books To Read
• Metasploit Commands Cheat Sheet
SecurityScope
SS|MF
Security Scope Metasploit Framework
Join this Course to be a Metasploit Ninja
/SecScop

SSMF (Security Scope Metasploit Framework) - Course Syllabus

  • 1.
  • 2.
    Security Scope Organization thatseeks to share information security awakening in Cyber-Space through teaching skills of Ethical-Hacking and Penetration-Testing Our Sponsor http://Securityking1.com SecurityScope
  • 3.
    About The Instructor •Name : Mustafa Abdel-sallam • Job title : CEO / Co-founder of Security Scope Organization Cyber-Sec Dep. Head at Source Valley • About: Mustafa has more than 4 years experience in Information Security Training His skills includes:  Python, C/C++, Ruby, Bash  Network administration  Penetration Testing SecurityScope
  • 4.
    Course Modules  Introductionto Metasploit and Setup lab  What is Metasploit Framework  Installing Metasploit on Windows  Installing Metasploit on Linux  Using Virtual Machines  Remote Access Metasploit Through SSH  Metasploit fundamentals  Metasploit Architecture  Metasploit Directories  Metasploit Interfaces  Metasploit Commands Basics  Metasploit Database SecurityScope
  • 5.
    SecurityScope  Information Gathering What is Foot-printing and Reconnaissance  How to Gather Information  Information Gathering Techniques with Metasploit  Integrate Metasploit With External Tools  Scanning  What is Scanning ?  Scanning Phases  Network Scanning  Port Scanning  Vulnerability Scanning  Exploitation Show and System Hacking • Searching for Valid Exploit • How to Exploit • Exploit System-Based Vulnerabilities • Understanding Metaploit Payloads and Sessions • Exploiting Multiple OS • Client Side Attacks • Some of Post Exploitation Modules • Deep Diving into Metasploit Exploitation Modules
  • 6.
     After Hacking •What is Post Exploitation • Colleting Data • Deep Diving into Windows Post Exploitation • Privilege Escalation • Maintaining Access with Metasploit Persistence • Metasploit Pivoting • Clearing System Logs Metasploit Backdoors • Introduction to MSFVenom • Generating Binary Payloads With MSFVenom • Windows OS Backdoors • Mining and Wrapping With MSFVenom • Linux OS Backdoors • Android OS Backdoors • Generating Binary Payloads With MsfConsole SecurityScope
  • 7.
     Meterpreter PostExploitation Modules  Android Post Exploitation  Persistence Android Backdoor  Linux Post Exploitation  Persistence Linux Backdoor  Metasploit in WEB Applications Attacks  Integrate Metasploit With BeEF XSS Frame Work  Browser AutoPwn Auxiliary  Exploiting XSS With Metasploit  Generating PHP Backdoor With MSFVenom  Exploiting Remote File Inclusion With Metasploit  Exploiting Command Execution With Metasploit SecurityScope
  • 8.
     Avoid AV,IDs and Firewalls  How Does AVs, Firewalls and IDs Work  How Reverse Connections Bypasses The Detections  How to Bypass AV  Automated tools to Avoid AV Detections  Manually Avoid AV Detections  Metasploit Tools and Scripts  Metasploit tools  Metasploit Resource Scripts  Make Your Own Metasploit Resource Scripts  Using External Tools With Metasploit  BeEF XSS (detailed)  SET Toolkit  Ettercap SecurityScope
  • 9.
     Metasploit GUIs Using MSFWeb  Using Armitage  Adding Armitage Custom Features by Cortana Script  Using Exploits Outside Metasploit  Exploit-DB  Generating Shell code with MSFVenom  Downloading The Whole Exploit-DB on Your Local Computer  End of The Course • Metasploit Summary • Some Things You Need to Know • Where to go from here • Recommended Books To Read • Metasploit Commands Cheat Sheet SecurityScope
  • 10.
    SS|MF Security Scope MetasploitFramework Join this Course to be a Metasploit Ninja /SecScop