SlideShare a Scribd company logo
1 of 10
Download to read offline
Metasploit Framework
for Ninja
Course Syllabus
Security Scope
Security Scope
Organization that seeks to share information
security awakening in Cyber-Space through
teaching skills of Ethical-Hacking and
Penetration-Testing
Our Sponsor
http://Securityking1.com
SecurityScope
About The Instructor
• Name :
Mustafa Abdel-sallam
• Job title :
CEO / Co-founder of Security Scope Organization
Cyber-Sec Dep. Head at Source Valley
• About:
Mustafa has more than 4 years experience in Information Security Training
His skills includes:
 Python, C/C++, Ruby, Bash
 Network administration
 Penetration Testing
SecurityScope
Course Modules
 Introduction to Metasploit and Setup lab
 What is Metasploit Framework
 Installing Metasploit on Windows
 Installing Metasploit on Linux
 Using Virtual Machines
 Remote Access Metasploit Through SSH
 Metasploit fundamentals
 Metasploit Architecture
 Metasploit Directories
 Metasploit Interfaces
 Metasploit Commands Basics
 Metasploit Database
SecurityScope
SecurityScope
 Information Gathering
 What is Foot-printing and Reconnaissance
 How to Gather Information
 Information Gathering Techniques with Metasploit
 Integrate Metasploit With External Tools
 Scanning
 What is Scanning ?
 Scanning Phases
 Network Scanning
 Port Scanning
 Vulnerability Scanning
 Exploitation Show and System Hacking
• Searching for Valid Exploit
• How to Exploit
• Exploit System-Based Vulnerabilities
• Understanding Metaploit Payloads and Sessions
• Exploiting Multiple OS
• Client Side Attacks
• Some of Post Exploitation Modules
• Deep Diving into Metasploit Exploitation Modules
 After Hacking
• What is Post Exploitation
• Colleting Data
• Deep Diving into Windows Post Exploitation
• Privilege Escalation
• Maintaining Access with Metasploit Persistence
• Metasploit Pivoting
• Clearing System Logs
Metasploit Backdoors
• Introduction to MSFVenom
• Generating Binary Payloads With MSFVenom
• Windows OS Backdoors
• Mining and Wrapping With MSFVenom
• Linux OS Backdoors
• Android OS Backdoors
• Generating Binary Payloads With MsfConsole
SecurityScope
 Meterpreter Post Exploitation Modules
 Android Post Exploitation
 Persistence Android Backdoor
 Linux Post Exploitation
 Persistence Linux Backdoor
 Metasploit in WEB Applications Attacks
 Integrate Metasploit With BeEF XSS Frame Work
 Browser AutoPwn Auxiliary
 Exploiting XSS With Metasploit
 Generating PHP Backdoor With MSFVenom
 Exploiting Remote File Inclusion With Metasploit
 Exploiting Command Execution With Metasploit
SecurityScope
 Avoid AV, IDs and Firewalls
 How Does AVs, Firewalls and IDs Work
 How Reverse Connections Bypasses The Detections
 How to Bypass AV
 Automated tools to Avoid AV Detections
 Manually Avoid AV Detections
 Metasploit Tools and Scripts
 Metasploit tools
 Metasploit Resource Scripts
 Make Your Own Metasploit Resource Scripts
 Using External Tools With Metasploit
 BeEF XSS (detailed)
 SET Toolkit
 Ettercap
SecurityScope
 Metasploit GUIs
 Using MSFWeb
 Using Armitage
 Adding Armitage Custom Features by Cortana Script
 Using Exploits Outside Metasploit
 Exploit-DB
 Generating Shell code with MSFVenom
 Downloading The Whole Exploit-DB on Your Local Computer
 End of The Course
• Metasploit Summary
• Some Things You Need to Know
• Where to go from here
• Recommended Books To Read
• Metasploit Commands Cheat Sheet
SecurityScope
SS|MF
Security Scope Metasploit Framework
Join this Course to be a Metasploit Ninja
/SecScop

More Related Content

What's hot

Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
devilback
 
Fit 13 penetration test 1
Fit 13 penetration test 1Fit 13 penetration test 1
Fit 13 penetration test 1
chephz DJ
 

What's hot (20)

Metasploit
MetasploitMetasploit
Metasploit
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Metasploit Demo
Metasploit DemoMetasploit Demo
Metasploit Demo
 
Metaploit
MetaploitMetaploit
Metaploit
 
Metasploit framework in Network Security
Metasploit framework in Network SecurityMetasploit framework in Network Security
Metasploit framework in Network Security
 
Metasploit
MetasploitMetasploit
Metasploit
 
Penetration testing using metasploit
Penetration testing using metasploitPenetration testing using metasploit
Penetration testing using metasploit
 
Pen-Testing with Metasploit
Pen-Testing with MetasploitPen-Testing with Metasploit
Pen-Testing with Metasploit
 
Metasploit for Web Workshop
Metasploit for Web WorkshopMetasploit for Web Workshop
Metasploit for Web Workshop
 
Metasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitMetasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With Metasploit
 
Metasploit - Basic and Android Demo
Metasploit  - Basic and Android DemoMetasploit  - Basic and Android Demo
Metasploit - Basic and Android Demo
 
Metasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner ClassMetasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner Class
 
Fit 13 penetration test 1
Fit 13 penetration test 1Fit 13 penetration test 1
Fit 13 penetration test 1
 
Metasploit
MetasploitMetasploit
Metasploit
 
Reversing malware analysis training part7 unpackingupx
Reversing malware analysis training part7 unpackingupxReversing malware analysis training part7 unpackingupx
Reversing malware analysis training part7 unpackingupx
 
Pentesting with Metasploit
Pentesting with MetasploitPentesting with Metasploit
Pentesting with Metasploit
 
Metasploit Railguns presentation @ tcs hyderabad
Metasploit Railguns presentation @ tcs hyderabadMetasploit Railguns presentation @ tcs hyderabad
Metasploit Railguns presentation @ tcs hyderabad
 
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
 
Metapwn
MetapwnMetapwn
Metapwn
 

Similar to SSMF (Security Scope Metasploit Framework) - Course Syllabus

Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
bestip
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm Hole
DefCamp
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Stephan Chenette
 

Similar to SSMF (Security Scope Metasploit Framework) - Course Syllabus (20)

Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
ADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdf
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm Hole
 
Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)
 
Introduction to metasploit
Introduction to metasploitIntroduction to metasploit
Introduction to metasploit
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introduction
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojan
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
Metasploit Computer security testing tool
Metasploit  Computer security testing toolMetasploit  Computer security testing tool
Metasploit Computer security testing tool
 
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT SecurityDev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 
Ground Zero Training- Metasploit For Web
Ground Zero Training- Metasploit For WebGround Zero Training- Metasploit For Web
Ground Zero Training- Metasploit For Web
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

SSMF (Security Scope Metasploit Framework) - Course Syllabus

  • 1. Metasploit Framework for Ninja Course Syllabus Security Scope
  • 2. Security Scope Organization that seeks to share information security awakening in Cyber-Space through teaching skills of Ethical-Hacking and Penetration-Testing Our Sponsor http://Securityking1.com SecurityScope
  • 3. About The Instructor • Name : Mustafa Abdel-sallam • Job title : CEO / Co-founder of Security Scope Organization Cyber-Sec Dep. Head at Source Valley • About: Mustafa has more than 4 years experience in Information Security Training His skills includes:  Python, C/C++, Ruby, Bash  Network administration  Penetration Testing SecurityScope
  • 4. Course Modules  Introduction to Metasploit and Setup lab  What is Metasploit Framework  Installing Metasploit on Windows  Installing Metasploit on Linux  Using Virtual Machines  Remote Access Metasploit Through SSH  Metasploit fundamentals  Metasploit Architecture  Metasploit Directories  Metasploit Interfaces  Metasploit Commands Basics  Metasploit Database SecurityScope
  • 5. SecurityScope  Information Gathering  What is Foot-printing and Reconnaissance  How to Gather Information  Information Gathering Techniques with Metasploit  Integrate Metasploit With External Tools  Scanning  What is Scanning ?  Scanning Phases  Network Scanning  Port Scanning  Vulnerability Scanning  Exploitation Show and System Hacking • Searching for Valid Exploit • How to Exploit • Exploit System-Based Vulnerabilities • Understanding Metaploit Payloads and Sessions • Exploiting Multiple OS • Client Side Attacks • Some of Post Exploitation Modules • Deep Diving into Metasploit Exploitation Modules
  • 6.  After Hacking • What is Post Exploitation • Colleting Data • Deep Diving into Windows Post Exploitation • Privilege Escalation • Maintaining Access with Metasploit Persistence • Metasploit Pivoting • Clearing System Logs Metasploit Backdoors • Introduction to MSFVenom • Generating Binary Payloads With MSFVenom • Windows OS Backdoors • Mining and Wrapping With MSFVenom • Linux OS Backdoors • Android OS Backdoors • Generating Binary Payloads With MsfConsole SecurityScope
  • 7.  Meterpreter Post Exploitation Modules  Android Post Exploitation  Persistence Android Backdoor  Linux Post Exploitation  Persistence Linux Backdoor  Metasploit in WEB Applications Attacks  Integrate Metasploit With BeEF XSS Frame Work  Browser AutoPwn Auxiliary  Exploiting XSS With Metasploit  Generating PHP Backdoor With MSFVenom  Exploiting Remote File Inclusion With Metasploit  Exploiting Command Execution With Metasploit SecurityScope
  • 8.  Avoid AV, IDs and Firewalls  How Does AVs, Firewalls and IDs Work  How Reverse Connections Bypasses The Detections  How to Bypass AV  Automated tools to Avoid AV Detections  Manually Avoid AV Detections  Metasploit Tools and Scripts  Metasploit tools  Metasploit Resource Scripts  Make Your Own Metasploit Resource Scripts  Using External Tools With Metasploit  BeEF XSS (detailed)  SET Toolkit  Ettercap SecurityScope
  • 9.  Metasploit GUIs  Using MSFWeb  Using Armitage  Adding Armitage Custom Features by Cortana Script  Using Exploits Outside Metasploit  Exploit-DB  Generating Shell code with MSFVenom  Downloading The Whole Exploit-DB on Your Local Computer  End of The Course • Metasploit Summary • Some Things You Need to Know • Where to go from here • Recommended Books To Read • Metasploit Commands Cheat Sheet SecurityScope
  • 10. SS|MF Security Scope Metasploit Framework Join this Course to be a Metasploit Ninja /SecScop