Autoplay
Autocomplete
Previous Lesson
Complete and Continue
تعلم الميتاسبلويت من الصفر للاحتراف Metasploit framework
Introduction to Metasploit and Supporting Tools
Chapter 1 Agenda (2:22)
The importance of penetration testing (5:24)
Vulnerability assessment versus penetration testing (2:16)
The need for a penetration testing framework (2:32)
When to use Metasploit (3:46)
Nessus (0:58)
NMAP (1:28)
w3af (0:30)
Setting up Your Environment
Chapter 2 Agenda (1:41)
Install VirtualBox (1:49)
Download and install kali box (5:47)
Install metasploitable2 machine (2:47)
Create Virtual Network (1:49)
Metasploit Components and Environment Configuration
Chapter 3 Agenda (1:11)
Anatomy and structure of Metasploit (5:45)
Metasploit components (4:25)
Playing around with MSF console (11:43)
Variables in Metasploit (10:32)
Modify Variables in Metasploit (4:38)
msfupdate (1:46)
Information Gathering with Metasploit
Information Gathering with Metasploit (2:16)
TCP Port Scan (5:58)
UDP Port Scan (2:56)
File Transfer Protocol Scan (3:52)
SMB Enumerate (4:00)
HTTP Enumerate (4:09)
SSH Enumerate (9:18)
Advanced search with shodan (8:43)
Vulnerability Hunting with Metasploit
Chapter 5 Agenda (1:37)
Managing the database (2:57)
Work spaces (2:45)
db_nmap (3:21)
db_autopwn (6:51)
exploitation (5:26)
Client-side Attacks with Metasploit
Chapter 6 Agenda (1:32)
What are client-side attacks (1:20)
What is a reverse shell (1:01)
bind_shell (0:56)
encoders (0:59)
using msfvenom and creating backdoor (13:06)
meterpreter command (8:09)
Hacking windows 10 using PDF (4:13)
Web Application Scanning with Metasploit
Chapter 7 Agenda (0:48)
Web application scanning using WMAP (3:37)
Armitage
Chapter 8 Agenda (0:40)
Armitage (0:36)
Armitage in Action (6:55)
Teach online with
Anatomy and structure of Metasploit
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock