logo

Mastering Metasploit (CS8504)

This course is a guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework.

This course covers a number of techniques and methodologies that will help you learn and master the Metasploit framework.

You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and a hands-on approach will help you understand everything you need to know about Metasploit.

Pohađajte naše hacking/cyber defense obuke u Beogradu, putem virtuelne učionice (online, uživo) ili u vašim prostorijama (on-site).

Specijalni popusti se odobravaju prilikom prijave više učesnika koji istovremeno pohađaju obuku iz vaše kompanije, državni i neprofitni sektor, itd. Kontaktirajte nas da biste saznali više.

Termini obuke

Beograd
Planirani datumPlanirani datum
13.06.2022
650€
1170€
Srpski
Novi Sad
Planirani datumPlanirani datum
13.06.2022
650€
1170€
Srpski
Virtuelna učionica
Garantovani datumGarantovani datum
13.06.2022
650€
1170€
Srpski
650€
Trajanje obuke: 
3 dana / 21 sat

Privatni trening

On-site / Online
Minimalan broj polaznika: 4
3 dana / 21 sat
Cena na zahtev
srpski ili engleski
Plan obuke: 

Module 1: Approaching a Penetration Test Using Metasploit

  • Setting up the environment
  • Mounting the environment
  • Conducting a penetration test with Metasploit
  • The dominance of Metasploit
  • Summary

Module 2: Reinventing Metasploit

  • Ruby – the heart of Metasploit
  • Developing custom modules
  • Breakthrough meterpreter scripting
  • Working with RailGun
  • Summary

Module 3: The Exploit Formulation Process

  • The elemental assembly primer
  • The joy of fuzzing
  • Building up the exploit base
  • Finalizing the exploit
  • The fundamentals of a structured exception handler
  • Summary

Module 4: Porting Exploits

  • Porting a Perl-based exploit
  • Porting a Python-based exploit
  • Porting a web-based exploit
  • Summary

Module 5: Offstage Access to Testing Services

  • The fundamentals of SCADA
  • SCADA torn apart
  • Securing SCADA
  • Database exploitation
  • VOIP exploitation
  • Post-exploitation on Apple iDevices
  • Summary

Module 6: Virtual Test Grounds and Staging

  • Performing a white box penetration test
  • Generating manual reports
  • Performing a black box penetration test
  • Summary

Module 7: Sophisticated Client-side Attacks

  • Exploiting browsers
  • File format-based exploitation
  • Compromising XAMPP servers
  • Compromising the clients of a website
  • Bypassing AV detections
  • Conjunction with DNS spoofing
  • Attacking Linux with malicious packages
  • Summary

Module 8: The Social Engineering Toolkit

  • Explaining the fundamentals of the social engineering toolkit
  • Attacking with SET
  • Providing additional features and further readings
  • Summary

Module 9: Speeding Up Penetration Testing

  • Introducing automated tools
  • Fast Track MS SQL attack vectors
  • Automated exploitation in Metasploit
  • Fake updates with the DNS-spoofing attack
  • Summary

Module 10: Visualizing with Armitage

  • The fundamentals of Armitage
  • Scanning networks and host management
  • Exploitation with Armitage
  • Post-exploitation with Armitage
  • Attacking on the client side with Armitage
  • Scripting Armitage
  • Summary
  • Further reading
Benefiti: 
  • Video snimak predavanja u periodu od 180 dana posle kraja obuke

  • Pristup laboratorijama u toku trajanja kursa
  • Materijal u elektronskom obliku

  • Sertifikat o pohađanju kursa

Kontaktirajte nas za više informacija o ceni:

Eccentrix
Office: +381 11 71 38 192
Mobile: +381 69 3138 100
E-mail: Ivana.Velickovic@eccentrix.rs

Milutina Milankovića 9đ,
11070 Novi Beograd
www.eccentrix.rs

Eccentrix
Office: +381 11 71 38 192
Mobile: +381 65 2390 001
E-mail: Jelena.Der@eccentrix.rs

Milutina Milankovića 9đ,
11070 Novi Beograd
www.eccentrix.rs