What you’ll learn
Attaching Kali to GNS3You will become an expert in using Metasploit for ethical hacking and network security.
Set up a lab environment to practice hacking
Install Kali Linux – a penetration testing operating system
Install Windows & vulnerable operating systems as virtual machines for testing
Learn Linux commands and how to interact with the terminal
Discover vulnerable applications
Vulnerability scanning, Exploit, Post Exploit, Payload
Gain control over computer systems using server side attacks
Exploit vulnerabilities to gain control over systems
Gathering password hashes, cracking passwords, taking screenshots, logging keystrokes etc.
Using backdoors to persist on the victim machine
The very latest up-to-date information and methods
During the course you will learn both the theory and how to step by step setup each method
- Be able to download and install all the free software and tools needed to practice
- A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
- Nothing else! It’s just you, your computer and your ambition to get started today
Welcome to my “Ethical Hacking with Metasploit: Exploit & Post Exploit” course.
This course is a monster!!!
It covers the fundamental building blocks of hacking, penetration testing (Kali Linux), gaining control using Metasploit and application development.
Do not worry. You don’t need to have a previous knowledge about all. This course will take you from a beginner to a more advanced level.
Good news is since free and popular tools are used you don’t need to buy any tool or application.
All my students will have a chance to learn how to set up a lab environment and install the needed virtual machines such as Kali Linux and the tools: Nessus and Metasploit.
This course starts with very basics. First you will learn how to install the the tools, some terminology and how devices communicate with each other. Then you will learn how to scan vulnerabilities with Nessus and gain full access to computer systems via discovering the weaknesses and vulnerabilities.
In this course you’ll also become an expert with Metasploit framework by using msfconsole interface. After learning Metasploit by practicing against victim machines you will be able to exploit and remotely access to Linux and Windows victim machines and gain control and access files (read/write/update/execute).
You will not only learn compromising the target systems via vulnerabilities but also Pass the Hash: a genuine way to exploit systems even though they don’t have any vulnerability.