Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

CAE in Cybersecurity Community via YouTube

Overview

Explore the comprehensive cycle of cyberattacks and penetration testing in this 54-minute lecture by Dr. Xinwen Fu from the University of Massachusetts, Lowell. Learn how to utilize Armitage, a GUI interface for the popular Metasploit tool, to perform information gathering, exploitation, and post-exploitation techniques. Discover the ease of conducting port scanning, hashdump, and password cracking with just a few clicks and commands. Gain insights into the Armitage interface, key terms, and practical examples using a Metasploitable target. Follow along as the lecture covers Armitage scanning, exploitation, and post-exploitation processes, including maintaining access and using Meterpreter commands. Understand the importance of screen capture and reporting in penetration testing. The lecture concludes with a demo setup, step-by-step instructions, and valuable references for further learning.

Syllabus

Intro
Outline
Cyberattacks
Cyberattack Cycle
Remote Exploit
Use credentials/Pass the hash
Armitage Interface
Terms
Example Target: Metasploitable
Armitage Scanning
Armitage Exploitation
Armitage Post Exploitation
Example Post Exploitation
Maintaining Access
Meterpreter commands!!!
Screen Capture!!!
Reports
Demo Setup
Steps
References

Taught by

CAE in Cybersecurity Community

Reviews

Start your review of Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.