After completing this course you will be able to:
- Have a fully working lab environment including Firewall, routers, exploitable servers, etc.
- Have a clear understanding and overview of all the tools available on the Metasploit Framework.
- Perform advance penetration testing.
- Develop and create your own tools on the Metasploit Framework.
What students should know before they join (student requirements)?
There are 3 Metasploit tools you need to became familiar with:
msfpayload – This is a command-line instance of Metasploit used to generate and output all of the various types of shell code available in Metasploit. This is mainly used for the generation of shell code for an exploit not found in Metasploit or for testing different types of shell code and options before finalizing a module. It is an excellent mix of different options and variables.
msfencode – This is another great tool in the Metasploit kit for exploit development. Its main use is to encode the shell code generated by msfpayload. This is done to suit the target in order to function properly. It may involve transforming the shell code into pure alphanumeric and getting rid of bad characters and encoding it for 64-bit targets. This can be used to encode the shell code multiple times; output it in various formats such as C, Perl, and Ruby; and even merge it to an existing executable file.
msfvenom – Technically speaking, msfvenom is a combination of msfpayload and msfencode. The advantages of msfvenom include a number of standardized command-line options, a single tool, and increased speed.
What will you learn in this workshop
- Deploy a fully sand boxed network running on Virtualbox to do all the testing you need;
- Have a fully exploitable server at your disposal;
- Configure and use a full functional Checkpoint firewall;
- Deploy your Metasploit framework with Kali Linux;
- Configure and deploy a fully working Cisco Router;
- Grasp basic navigation concepts and commands of the Metasploit Framework;
- Recreate a fully functional network for present and future testing.
- Using Metasploit to gather information than you can use in your advantage;
- Advance scan techniques using specific Metasploit modules and leverage that with the use of our database;
- Scanning: how to use some of the auxiliary scanning modules existing already on the Metasploit Framework.
- Run a fully functional lab environment for your penetration testing;
- Work your way around Metasploit cli;
- Create, manage and connect your Metasploit to multiple databases;
- Work with Workspaces;
- Use some of the auxiliary exploits in the discovery process;
- Run network scans from inside Metasploit;
- Save results inside a workspace;
- Use auxiliary exploits to get credentials from our target.
- Real life example on how to create a back door;
- Building a Windows 7 machine;
- Coding fundamentals.
Senior Security Engineer at Data Solutions
An enthusiastic security and network engineer with the necessary drive and determination needed to resolve complex networking issues. Possessing effective organizational skills and excellent working knowledge of networking technologies and having a commitment to keep up to date with the latest developments. Experienced in providing motivation, guidance and an up to date networking consultancy service to both colleagues and clients.