Advanced Operation with Metasploit

Formations Advanced Operation with Metasploit

OBJECTIF

This training will immerse you in the heart of Metasploit and its various components. You will learn how to use all the advanced features offered by this framework, tools provided by the Rex library to tools like Meterpreter or Railgun. You will also learn how to create a Meterpreter extension, automate actions via scripts for Railgun, the details of the different modes. communication supported by Metasploit. You will also discover the possibilities offered by Metasploit for the production of encoders and polymorphic payloads.

In particular, the objectives of the training are:

  • Exploit all the capabilities of the Metasploit framework
  • Create different kinds of modules for Metasploit (encoders, exploits, auxiliary)
  • Understand how Rex works
  • Design Meterpreter extensions

PREREQUISITES

• Knowledge of assembler language

• Mastering Linux and Windows environments

• Mastering the conventional use of Metasploit

GENERAL INFORMATION

• Code : EAM
• Duration : 4 Days
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord

TARGETED AUDIENCE

  • • Experienced technical auditors

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

PROGRAM OF TRAINING

  • Days 1
  • Presentation of the Metasploit framework
  • personalization
  • Metasploit and Docker
  • Advanced use of Metasploit
    1. • Using advanced options of meterpreter modules
      • Anti-virus workaround

  • SEtoolkit and Metasploit
  • Days 2
  • Recognition with Metasploit
    1. • Using scanners
      • Creating a scan module

  • Operating techniques
    1. • Operating a user station
      • Exploitation of a service
      • Takeover of a domain
      • Pivoting Techniques

  • Module development
    1. • Development of an exploitation module
      • Development of a fuzzing module

  • Days 3
  • Rex Library
    1. • Presentations, Features
      • Dynamic assembly
      • Encoding
      • Logging
      • Support of various protocols
      • Development with Rex: exploit, payload, auxiliary

  • Meterpreter script development
    1. • Software meterpreter architecture
      • Interaction with Metasploit
      • Railgun
      • Development of plugins (ruby)

  • Days 4
  • Payload development
    1. • Assembler reminder
      • Structure of a payload module
      • Creating a custom shellcode
      • Integration of a Metasploit module

  • Create your own encoder
    1. • Development and integration of a new encoder

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.