HCME: Hack Planet Certified Metasploit Expert
HCME: Hack Planet Certified Metasploit Expert
HCME: Hack Planet Certified Metasploit Expert
INTRODUCTION
The Metasploit Framework is basically a tool for development and release of exploits frequently used in audits Penetration Testing. The framework consists of a series of tools, exploits and code that can be used through different interfaces. The course aims to present the tool, its architecture and functionalities, as well as the possibilities of manipulation and development within the framework of exploits. The main features will be demonstrated in practice by using a test environment set up during class.
Objectives
Understanding of how metasploit can be used extensively in Penetration testing. In depth understanding of Metasploit far beyond remote machine exploitation.
Audience
The course "Metasploit" is ideal for professionals who want to determine the security posture of a company, identify and exploit potential problems in processes and critical assets of your business. This course can be helpful to: Penetration testers IT Security officers Network administrators Security researchers Auditors Vulnerability Assessment Professionals Corporate Trainers
Pre-requisite
Basic knowledge of command line interface Basic knowledge of Linux and Windows Good knowledge of networking and TCP/IP
Course Duration
6 days [48 Hours]
Course Fee
Rs 16,000 /- Only
Course Contents
0. 1. Student Introduction Basic Of Ethical Hacking
a. b. c.
2.
d. Metasploit Basics
Basic Terminologies Exploits Vulnerabilities Exploits Metasploit interfaces i. Msfconsole ii. Msfcli iii. Armitage Metasploit Utilities
a.
b.
3.
a. b. c. d.
4.
Introduction Scope / Goal Methodology Points to Remeber Using Auxiliary Modules Using Exploit Modules Using Payloads Using Encoders Passive Info Gathering i. Whois ii. Archives iii. NSlookup iv. Trace Routes v. Site Crawling vi. DNS Records Active Info Gathering i. Identifying Open Hosts ii. Identifying Open Ports iii. Banner Grabbing iv. Operating System Fingerprinting Vulnerability Assessment i. Scanning With Nessus ii. Scanning with Nexpose iii. Database integration and Automated Exploitation Basic Exploitation Client Exploits DLL Hijacking Exploitation i. File Format Exploits [PDF, PPT, XLS] Browser Based exploits Server Exploits Pass The Hash Automating the Exploitation Importing Nmap/Nessus XMLs OS Specific payloads Generic Payloads Payload king Meterpreter Creating your own payloads. Encoding Multi Encoding Packers Introduction Stdapi and priv Windows Tokens [Incognito Extension]
Metasploit Usage
a. b. c. d.
5.
Information gathering.
a.
b.
c.
6.
a. b. c. d. e.
7.
Advanced Exploitation.
a. b. c.
8. Pay loads.
a. b. c. d.
9.
a. b. c. a. b. c.
d. e. f. g. a. b. c. d. a. b. c. d. e.
Sniffing using Espia and sniffer Extensions Privilege Escalation Backdooring Pivoting Writing Meterpreter scripts Custom Scripting Using API calls Persistent Meterpreter Scripting MSF Port Scanners Version Fingerpriting Login Scanners Banner Grabbing Sniffing Enumeration SET [Social Engineering Toolkit] Fast Track Karmetasploit Armitage Introduction Need and Benefits of Porting Exploits Methodology Testing the Work.
a. b. c. d. a. b. c. d.