Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Penetration Testing with Metasploit & Analyzing the IDS logs

Welcome :
Welcome


Introduction :
The Introduction Headlines
What is a Vulnerability ?
What is an Exploit and a Payload ?
What is and why ... Metasploit ?
The Intro Quiz
1 question


Metasploit Basics :
Metasploit Interfaces - MSFConsole
Metasploit interfaces - MSFCli
Metasploit Interfaces - Armitage
The Basic Section Quiz
1 question


Reconnaissance and Information gathering phase :
NMAP - Intro and different scanning options
Scan Types and Options Summary for Nmap
Checking the IDS (Intrusion Detection System) events while Reconnaissance Scan
db_nmap
db_import
Nessus - download and install
Nessus - Scan a target
Nessus - Create and Tune a Scan Policy
Reconnaissance and Information gathering Quiz
1 question


Exploitation Phase :
Search for an Exploit
A Demo for Exploiting a Linux target - Shellshock
A Demo for Exploiting a Windows target
Checking the IDS (Intrusion Detection System) events while exploiting
Exploitation Quiz
1 question


Post Exploitation Phase :
Meterpreter - Part 1
Meterpreter - Part 2
Clear your traces - Windows Victim
Post Exploitation Quiz
1 question


Armitage :
Getting started with Armitage
Armitage - scanning
Armitage - exploiting
Armitage Quiz
1 question


Intrusion Detection System (IDS) Evasion :
Intrusion Detection System (IDS) Evasion
Wireshark exploit packet analysis in case of No Evasion and also Success Evasion
The Fix of the IDS Evasion while Bash Shellshock Exploit

You Have Got Gift 25% OFF

Use this Coupon Code “J3JKN396