Have any questions? +91-706-507-1212 training@cybertronns.com

CyberTron Certified Metasploit Expert-CCME

Introduction

you will understand the Ruby foundations of Metasploit and how interacting with these underpinnings will greatly optimize and enhance your testing activities. Further, you will understand how far you can extend your exploitation activities through the effective use of some of the late-breaking features of the amazing Meterpreter. Finally, have you ever wondered how you can compromise an entire Domain from simple Windows system access? After this day you will know exactly how to achieve this kind of result. After all, shell is only the beginning.

Our intuition about the future is linear. But the reality of information technology is exponential, and that makes a profound difference. If I take 30 steps linearly, I get to 30. If I take 30 steps exponentially, I get to a billion.

Ray Kurzweil

you will understand the Ruby foundations of Metasploit and how interacting with these underpinnings will greatly optimize and enhance your testing activities. Further, you will understand how far you can extend your exploitation activities through the effective use of some of the late-breaking features of the amazing Meterpreter. Finally, have you ever wondered how you can compromise an entire Domain from simple Windows system access? After this day you will know exactly how to achieve this kind of result. After all, shell is only the beginning.

Session 1 :  Introduction

  •   What is Metasploit?

  •    Requirements

  •    Architecture of Metasploit

Session 2 :  Metasploit Fundamentals

  •     Msfconsole

  •     Payloads

  •      Exploits

Session 3:     Meterpreter and its Basics

Session 4:     Information Gathering

  •     Port Scanning

  •     Os Scanning

  •     Service Identification

Session 5: Client Side Attacks

Session 6: Msf Post Exploitation

  •    Searching For Content

  •    Pass the hash

  •    Capturing the screen

  •    Event Log Management

  •     Fun with Incognito

  •     Enabling Remote Desktop

Session 7: Maintaining Access

  •    Keylogging

  •    Backdoors                                

Session 8: Msf Extended Usage

 

Intersted in this course ?

Quick Info

  • * 50% Advance fee.

Students Reviews