Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube
Overview
Syllabus
Intro
Outline
Cyberattacks
Cyberattack Cycle
Remote Exploit
Use credentials/Pass the hash
Armitage Interface
Terms
Example Target: Metasploitable
Armitage Scanning
Armitage Exploitation
Armitage Post Exploitation
Example Post Exploitation
Maintaining Access
Meterpreter commands!!!
Screen Capture!!!
Reports
Demo Setup
Steps
References
Taught by
CAE in Cybersecurity Community