Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

CAE in Cybersecurity Community via YouTube Direct link

Steps

19 of 20

19 of 20

Steps

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 Cyberattacks
  4. 4 Cyberattack Cycle
  5. 5 Remote Exploit
  6. 6 Use credentials/Pass the hash
  7. 7 Armitage Interface
  8. 8 Terms
  9. 9 Example Target: Metasploitable
  10. 10 Armitage Scanning
  11. 11 Armitage Exploitation
  12. 12 Armitage Post Exploitation
  13. 13 Example Post Exploitation
  14. 14 Maintaining Access
  15. 15 Meterpreter commands!!!
  16. 16 Screen Capture!!!
  17. 17 Reports
  18. 18 Demo Setup
  19. 19 Steps
  20. 20 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.