Penetration Testing with Metasploit & Analyzing the IDS logs


Penetration Testing with Metasploit & Analyzing the IDS logs
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 29 | 268 MB
Genre: eLearning | Language: English


Learn to conduct PenTesting / White Hacking using Metasploit plus Analyzing the Intrusion Detection System (IDS) events

This course will teach you to how to perform Penetration Testing / Hacking using Metasploit, the world most popular and powerful exploiting framework.

Also we'll check and analyze the events of the Intrusion Detection System (IDS) in case we are conducting exploit sessions and the reconnaissance scans.

The course will teach you step-by-step how to gather information, exploit, control your target/victim and clear your traces.

The course material is presented in a practical Real-life demos that will let you have hands-on the principles and techniques that will assist you to be a successful security professional, penetration-tester or any other career path related to the IT Security.

By the end of this course you’ll be able to perform Network Security Audits / Penetration Testing efficiently using Metasploit Framework.

This course will develop and empower your Information Security knowledge and thus will take your career path to a higher step.

Why this course is Special ?!

There is some lectures where i present the IDS (Intrusion Detection System) events capturing the attack / reconnaissance conducted in the presented demos.
95% of the Course Content is practical Real-life scenario demos.
The Course is updated from time-to-time with new videos and lessons.
After enrolling now you'll have a lifetime access to the current published lectures and the future one also.

Coming Soon Lectures :

Intrusion Detection System (IDS) Evasion while Shellshock Exploit. (Done - Oct 24 2016)
Wireshark Analysis for the Exploit Packet while IDS Evasion. (Done - Nov 15  2016)
Fix done by the vendor for the IDS Evasion while Shellshock exploit (Done - Dec 19  2016)
Analyzing the Exploit and Reconnaissance captured packets using Wireshark
OpenVAS integration with Metasploit
Hail Mary attack in Armitage

 

Penetration Testing with Metasploit & Analyzing the IDS logs
Penetration_Testing_with_Metasploit___Analyzing_the_IDS_logs.part1.rar - 100.0 MB
Penetration_Testing_with_Metasploit___Analyzing_the_IDS_logs.part2.rar - 100.0 MB
Penetration_Testing_with_Metasploit___Analyzing_the_IDS_logs.part3.rar - 68.7 MB


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 nagy   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss