Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

HCME: Hack Planet Certified Metasploit Expert

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

HCME : Hack Planet Certified Metasploit Expert

INTRODUCTION
The Metasploit Framework is basically a tool for development and release of exploits frequently used in audits Penetration Testing. The framework consists of a series of tools, exploits and code that can be used through different interfaces. The course aims to present the tool, its architecture and functionalities, as well as the possibilities of manipulation and development within the framework of exploits. The main features will be demonstrated in practice by using a test environment set up during class.

Objectives
Understanding of how metasploit can be used extensively in Penetration testing. In depth understanding of Metasploit far beyond remote machine exploitation.

Audience
The course "Metasploit" is ideal for professionals who want to determine the security posture of a company, identify and exploit potential problems in processes and critical assets of your business. This course can be helpful to: Penetration testers IT Security officers Network administrators Security researchers Auditors Vulnerability Assessment Professionals Corporate Trainers

Pre-requisite
Basic knowledge of command line interface Basic knowledge of Linux and Windows Good knowledge of networking and TCP/IP

Course Duration
6 days [48 Hours]

Course Fee
Rs 16,000 /- Only
Course Contents
0. 1. Student Introduction Basic Of Ethical Hacking

a. b. c.
2.

d. Metasploit Basics

Basic Terminologies Exploits Vulnerabilities Exploits Metasploit interfaces i. Msfconsole ii. Msfcli iii. Armitage Metasploit Utilities

a.

b.

3.

Basics of Penetration Testing

a. b. c. d.
4.

Introduction Scope / Goal Methodology Points to Remeber Using Auxiliary Modules Using Exploit Modules Using Payloads Using Encoders Passive Info Gathering i. Whois ii. Archives iii. NSlookup iv. Trace Routes v. Site Crawling vi. DNS Records Active Info Gathering i. Identifying Open Hosts ii. Identifying Open Ports iii. Banner Grabbing iv. Operating System Fingerprinting Vulnerability Assessment i. Scanning With Nessus ii. Scanning with Nexpose iii. Database integration and Automated Exploitation Basic Exploitation Client Exploits DLL Hijacking Exploitation i. File Format Exploits [PDF, PPT, XLS] Browser Based exploits Server Exploits Pass The Hash Automating the Exploitation Importing Nmap/Nessus XMLs OS Specific payloads Generic Payloads Payload king Meterpreter Creating your own payloads. Encoding Multi Encoding Packers Introduction Stdapi and priv Windows Tokens [Incognito Extension]

Metasploit Usage

a. b. c. d.
5.

Information gathering.

a.

b.

c.

6.

Exploitation Kung Fu.

a. b. c. d. e.
7.

Advanced Exploitation.

a. b. c.
8. Pay loads.

a. b. c. d.
9.

Evading Antivirus, IDS, IPS

a. b. c. a. b. c.

10. Post Exploitation using Meterpreter.

d. e. f. g. a. b. c. d. a. b. c. d. e.

Sniffing using Espia and sniffer Extensions Privilege Escalation Backdooring Pivoting Writing Meterpreter scripts Custom Scripting Using API calls Persistent Meterpreter Scripting MSF Port Scanners Version Fingerpriting Login Scanners Banner Grabbing Sniffing Enumeration SET [Social Engineering Toolkit] Fast Track Karmetasploit Armitage Introduction Need and Benefits of Porting Exploits Methodology Testing the Work.

11. Meterpreter Scripting.

12. Power of Auxiliary modules.

f. 13. Advanced metasploit.

a. b. c. d. a. b. c. d.

14. Porting Exploits to Metasploit

You might also like