This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:
- Metasploit Basics and Framework Organization
- Server and Client Side Exploitation
- Meterpreter – Extensions and Scripting
- Database Integration and Automated Exploitation
- Post Exploitation Kung-Fu – Exploring the system, Privilege escalation, Log deletion and AV / Firewall bypass
- Token stealing and impersonation, Backdoors and Rootkits, Pivoting and Port forwarding, Railgun and Custom Scripting,
- Backdoor an Executable
- Exploit research with Metasploit- Buffer Overlows, SEH etc.
- Scenario Based Hacking using Metasploit