Ethical Hacking with Nmap and Metasploit Framework Part-2

Understand architecture, scanning flow and components of Nmap Scanner.

Learn to launch basics to advance Scans with Nmap Scanner

Learn to Integrate Nmap with Metasploit Framework

Practically understand the working, components and commands in Metasploit Framework

Requirements

  • Basic understanding of IP Networking

Description

Learn to conduct vulnerability assessment with Nmap and penetration testing Metasploit framework.

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

The Metasploit Project was undertaken in 2003 by H.D. Moore for use as a Perl-based portable network tool, with assistance from core developer Matt Miller. It was fully converted to Ruby by 2007, and the license was acquired by Rapid7 in 2009, where it remains as part of the Boston-based company’s repertoire of IDS signature development and targeted remote exploit, fuzzing, anti-forensic, and evasion tools.

Who this course is for:

  • Students who want to kickstart their career in Security Testing.

Course content

1 section • 5 lectures • 1h 6m total length

Getting started with Metasploit Framework5 lectures • 1hr 7min

  • Getting started with Metasploit Framework21:57
  • Setting up PostgreSQL09:03
  • Creating Workspaces09:26
  • Integrating Nmap with Metasploit Framework13:36
  • Optional: Nmap Recap12:56

Ethical Hacking Tools: Metasploit Framework

What you’ll learn

  • Metasploit framework and msfconsole
  • Msfconsole commands
  • Scan a target system using Metasploit
  • SMB (Server Message Block) scans
  • Use the Metasploit databse feature
  • Conduct vulnerability scan using Metasploit
  • Exploit vulnerables services on target system
  • Generate payloads with msfvenom
  • Gain initial access to the target system
  • Create a reverse shell payload
  • Upgrade a standard shell to Meterpreter shell
  • Create a simple HTTP server using python
  • Transfer files to a remote host
  • Search Metasploit modules
  • Connect Metasploit to the postgresql database
  • Create and manage workspaces
  • Create and manage sessions
  • Run simple Nmap scan
  • Connect to a remote host via SSH service

Course content

2 sections • 9 lectures • 42m total lengthExpand all sections

Introduction3 lectures • 7min

  • Introduction to the MetasploitPreview01:16
  • Environment setupPreview03:46
  • Metasploit modulesPreview01:47
  • Quiz4 questions

Metasploit6 lectures • 36min

  • MsfconsolePreview06:33
  • Attack simulation: EternalBlue07:23
  • Metasploit database feature05:04
  • Receiving a reverse shell with msfvenom12:10
  • Upgrade normal shell to a meterpreter shell03:24
  • Quiz4 questions
  • Summary01:11

Requirements

  • Basic Linux skills.

Description

Learn ethical hacking using the world’s most used penetration testing framework. Metasploit Framework is a must if you plan a career in cybersecurity. It’s even pre-installed in the Linux distrubutions like Kali Linux or Parrot OS.

This course is different then most of the courses on Udemy. I strive for my courses to be no longer than one hour and to provide you only with important information, the ones that you will most often use in practice. If you like this approach, I invite you to enroll for the course.

This tool is frequently utilized by different types of hackers. Malicious intruders and skilled, ethical hackers. Keep in mind to use it ethically and legally.

Metasploit is a very powerful framework if you know how to use it. You will learn how to set up your environment and connect to target machines via a VPN (Virtual Private Network). You will learn about different versions of Metasploit and msfconsole – the main interface of the Metasploit. You will simulate an attack on Windows system using one of the most famous exploits – EternalBlue. You will know the difference between vulnerabilityexploit and payload. I will teach you how to generate payloads for various operating system and configruations with msfvenom. You will run simple scans using Nmap, connect to a remote host via SSH service, create a HTTP server in python and change permissions of files among others. I will show you how to receive a reverse shell connection, execute commands remotely on the target system and upgrade a standard shell to the meterpreter shell which offers much more options. I hope you will enjoy this course and learn something useful. Working with Metasploit often requires knowledge about other tools, but in this course Metasploit is always in the center of atterntion.

Note: This course is created for educational purposes only. You shall not misuse the information to gain unauthorised access.

Who this course is for:

  • Anybody interested in learning ethical hacking / penetration testing.