This post contains affiliate links. As an Amazon Associate I earn from qualifying purchases
You’ll learn how to download, install, and configure the software; how to extend Metasploit; how to perform system reconnaissance and vulnerability identification missions; how to use exploits; and the basics of social engineering attacks, such as phishing and site cloning. Learn to perform basic network and system security scans using Metasploit Understand Metasploit’s command line, graphical, and web interfaces Survey reconnaissance techniques like Nmap scanning, SYN scanning, and service scanning Explore vulnerability identification practices like SMB and VNC open service scanning Learn to use the exploits in Metasploit to attack systems and identify system vulnerability See how to develop custom security functions using Ruby scripts Explore phishing attacks, site cloning, and more
This post contains affiliate links. As an Amazon Associate I earn from qualifying purchases