15-Day Satisfaction Guarantee
We want you to be happy with every course you purchase! If you’re unsatisfied for any reason, we will issue a store credit refund within 15 days of purchase.
- Access 23 lectures & 3 hours of content 24/7
- Understand how to move around Metasploit
- Learn how to not be seen by intrusion detection system & evade anti-virus software used by professional penetration testers
- Explore Empire, how to gain sessions known as “agents,” escalate privileges & migrate over to the Metasploit framework
- Discover penetration tactics in real-time through visual learning
Nick Smith has substantial experience in Networking & Systems Management covering Windows, *nix & Mac. He has worked from the ground up as a Systems Administrator / Network Administrator, ISP, Provisioning Broadband services & MPLS Networks in large corporate environments. He has been involved in running penetration test engagements within the Financial Sector Services for some of the largest global banking Institutes. Nick currently holds the Qualys Vulnerability Assessor Certification, & will explore CREST and others when he has time in the future.
- Length of time users can access this course: lifetime
- Access options: web streaming, mobile streaming
- Certification of completion not included
- Redemption deadline: redeem your code within 30 days of purchase
- Experience level required: all levels
- Instant digital redemption
Give $10, Get $10
Course Outline
- Learn Metasploit
- Navigation around the Console, Shortcut Keys, Searching and Time Saving Key Tips (14:34)
- Understanding OS Finger Printing for Information Gathering Purposes (7:07)
- Understanding the famous MS08067netapi Exploit (7:00)
- Upgrading Command Shells to Meterpreter (5:06)
- Denial Of Service – MS12-020 MS Remote Desktop Use After Free (7:32)
- Exploitation – Web Script Delivery in PowerShell (14:08)
- Creating AutoRun Scripts for Fast Code Execution (5:09)
- Post Exploitation – Gathering Hashes – Cracking with JTR and OPHCRACK
- Post Exploitation – Mimikatz Usage for Password Recovery (7:15)
- Post Exploitation – ‘Pass the Hash’ – (update) What it is and how to use it (10:21)
- Post Exploitation – ‘Pivoting’ (Compromise Sessions through Sessions!) (19:23)
- Post Exploitation – Using the ‘ask’ Module (6:32)
- Persistence (5:47)
- Covering Your Tracks! – Don’t Get Caught….. (4:00)
- Learn PowerShell Empire
- Installation and Basic Setup (1:44)
- Navigation around the Console, Shortcut Keys, Searching and Time Saving Key Tips (45:12)
- Creating Base64 encoded Powershell Stagers
- Creating a Component Scriptlet Stager to create shells! (0:16)
- Interacting with ‘Agents’ (0:05)
- Privilege Escalation – ‘Bypass UAC’ – 3 Different Methods! (3:01)
- Privilege Escalation – ‘Ask’ Module (1:21)
- Migrate to a ‘SYSTEM’ user and *Try to use mimikatz!
- Empire to Metasploit to Harvest passwords (0:04)
Course Outline
- Learn Metasploit
- Navigation around the Console, Shortcut Keys, Searching and Time Saving Key Tips (14:34)
- Understanding OS Finger Printing for Information Gathering Purposes (7:07)
- Understanding the famous MS08067netapi Exploit (7:00)
- Upgrading Command Shells to Meterpreter (5:06)
- Denial Of Service – MS12-020 MS Remote Desktop Use After Free (7:32)
- Exploitation – Web Script Delivery in PowerShell (14:08)
- Creating AutoRun Scripts for Fast Code Execution (5:09)
- Post Exploitation – Gathering Hashes – Cracking with JTR and OPHCRACK
- Post Exploitation – Mimikatz Usage for Password Recovery (7:15)
- Post Exploitation – ‘Pass the Hash’ – (update) What it is and how to use it (10:21)
- Post Exploitation – ‘Pivoting’ (Compromise Sessions through Sessions!) (19:23)
- Post Exploitation – Using the ‘ask’ Module (6:32)
- Persistence (5:47)
- Covering Your Tracks! – Don’t Get Caught….. (4:00)
- Learn PowerShell Empire
- Installation and Basic Setup (1:44)
- Navigation around the Console, Shortcut Keys, Searching and Time Saving Key Tips (45:12)
- Creating Base64 encoded Powershell Stagers
- Creating a Component Scriptlet Stager to create shells! (0:16)
- Interacting with ‘Agents’ (0:05)
- Privilege Escalation – ‘Bypass UAC’ – 3 Different Methods! (3:01)
- Privilege Escalation – ‘Ask’ Module (1:21)
- Migrate to a ‘SYSTEM’ user and *Try to use mimikatz!
- Empire to Metasploit to Harvest passwords (0:04)
Source
https://academy.sciencealert.com/sales/hands-on-interactive-penetration-testing-ethical-hacking