This device is not compatible.
You will learn to:
Understand the fundamentals of the Metasploit tool.
Understand the basics of penetration testing.
Skills
Cyber Security
Penetration Testing
Prerequisites
Basic knowledge of networks
Familiarity with common types of vulnerabilities and exploits
Technologies
metasploit
Project Description
Pentesting (penetration testing) refers to breaching an application or network to identify potential security risks. In a corporate scenario, external professionals hired to test the institution’s networks and software products usually perform this task. The goal is that, after rigorous pentesting, any discovered vulnerabilities will be patched.
There are many different kinds of vulnerabilities, and as such, various tools in a pentester’s arsenal can be used to probe for and exploit them. This project will focus on the versatile and powerful Metasploit Framework.
Project Tasks
1
Initial Setup
Task 0: Get Started
Task 1: Initialize the Metasploit
Task 2: Explore the Target Machine
2
Auxiliary Modules
Task 3: Use Auxiliary Modules for Port Scanning
Task 4: Execute the SMB Scanner
3
Exploits
Task 5: Gain Access to Shell on the Target Machine
Task 6: Upload a File to the Target Machine
Task 7: Access the PostgreSQL Shell
Congratulations!
Relevant Courses
Use the following content to review prerequisites or explore specific concepts in detail.