Book Image

Mastering Metasploit 5.0 [Video]

By : Sunil Gupta
Book Image

Mastering Metasploit 5.0 [Video]

By: Sunil Gupta

Overview of this book

Metasploit 5 is a very popular exploitation framework and it is one of the largest exploit databases around. As a security researcher, it is important for you to know how a hacker might think and explore all the security holes so that it can be patched properly. In the course, we will look in-depth on steps to find loopholes and exploit vulnerable systems. This course will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities. You will work with Metasploit architecture and work on real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, you will go on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. You will also cover the multiple new features introduced in Metasploit 5 and how it benefits your usage of Metasploit. Metasploit 5 now also supports Go, Python and Ruby module languages, which can prove useful. By the end of the course, you will be able to implement time-saving techniques using Metasploit 5 and gain the skills to carry out penetration testing in complex and highly-secured environments.
Table of Contents (10 chapters)
Chapter 7
Web Application Scanning
Content Locked
Section 2
Setup WMAP in Metasploit
In this video, we will setup WMAP in Metasploit. - Start services in Kali Linux - Initialize database - Load WMAP in Metasploit