Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 887 MB
Genre: eLearning Video | Duration: 25 Lessons (1h 40m) | Language: English
Study the advance level Metasploit and develop practical ethical hacking skills through post-exploitation techniques.
What you'll learn Homepage: https://www.udemy.com/course/advanced-hacking-with-metasploit/
Lab setup using Kali Linux for practice purposes.
GUI framework of the Metasploit.
Information Gathering using Metasploit.
Vulnerability Scanning using Metasploit.
Learning post-exploitation techniques (shell access, keylogger, hashdump, how to clear logs).
How can you gain access to the computer system using Metasploit.
Requirements
Basic knowledge of Metasploit.
Basic computer and internet browsing knowledge.
A Laptop/PC with Windows or Linux operating system.
Description
This course will explain the advance level concepts of the largely popular penetration testing tool: Metasploit. Metasploit framework is extensively used for testing and describing common security vulnerabilities.
This is a practical based course that will work on real-life case studies and also introduce you to multiple latest features of Metasploit. Those features include post-exploitation techniques such as reverse connection and remote access of someone’s computer, screenshot of the victim's desktop, search function, etc. You will get to install the GUI version of Metasploit and learn how can you scan and analyze the target using GUI Metasploit. This is an advance level course that also provides a brief introduction of Metasploit and the lab setup for its framework.
Who this course is for:
Students having an interest in learning Ethical Hacking and Penetration Testing tools.
Anyone who wants to gain advanced-level knowledge of Metasploit.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.