Backtrack Metasploit Megaprimer

Wednesday, September 28, 2011

Dan Dieterle

B64e021126c832bb29ec9fa988155eaf

The Metasploit Framework included with the Backtrack series is an amazing platform for penetration and security testing. The capabilities are just stunning.

The problem is the learning curve can be kind of steep, especially for new users.

There are many video training tutorials out there and Offensive Security even offers the free “Metasploit Unleashed” training which is very good.

But it would be nice to have a comprehensive video series that starts with the very basics of Metasploit and leads you through the entire platform to the more advanced features.

Look no further than Vivek Ramachandran’s “Metasploit Megaprimer” video series. Vivek has created a huge training session on Metasploit spanning almost 20 videos.

The training is top notch, and very easy to follow.

Some of the topics covered include:

  • Meterpreter Basics and Using Stdapi
  • Meterpreter Extensions
  • Database Integration
  • Post Exploitation Kung Fu
  • Post Exploitation Privilege Escalation
  • Backdoors, Pivoting, Port Forwarding and much, much, more!

I had the absolute honor of working with Vivek as a technical editor on his just released book “BackTrack 5 Wireless Penetration Testing Beginner’s Guide“.

He is one of the top security experts of India, has spoken at numerous security conferences, and runs the very popular website “SecurityTube”.

Vivek has an amazing ability to take very complex ideas and breaking them down into very easy to understand lessons.

If you are new to Metasploit, or want to learn more about it, check out the Metasploit Megaprimer. It will be time well spent!

Cross-posted from Cyber Arms

Possibly Related Articles:
19377
Network->General
Software
Training Tools Penetration Testing Backtrack Metasploit Meterpreter Ethical Hacking
Post Rating I Like this!
Default-avatar
ming liu Hi,everybody!

someone can help about metasploit common ?

msf > use post/multi/gather/dns_reverse_lookup
msf post(dns_reverse_lookup) > set RHOSTS [TARGET HOST RANGE]
msf post(dns_reverse_lookup) > set SESSION [INTEGER]


here is the Usage Information


RHOSTS IP Range to perform reverse lookup against

SESSION The session to run this module on



I know set first one : set RHOSTS 11.11.1.1- 11.11.1.10 or 11.11.1.1-10

but I don't know how to set " SESSION " someone can help?
1330487592
Default-avatar
Ashish Bhangale The Metasploit megaprimer has been re-created with the latest advances and also with a certification: http://securitytube-training.com/certifications/securitytube-metasploit-framework-expert/ Testimonials look good.
1330941010
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.