Img 20171202 110524

Abstract

Pentesting with Metasploit.

Prerequisite

  1. Laptop with charger.
  2. Oracle Virtual Box.
  3. Kali Linux or Parrot with bridge adapter connection.
  4. Vulnerable Machine - Metasploitable 3 , Windows 7.

Session Description

  1. Brief description about metaspoit.
  2. Metasploit architecture.
  3. Types of metasploit.
  4. Intorduction about msfvenom
  5. Glass-fish Exploit using metasploit.
  6. Tomcat Exploit using metasploit.
  7. Jenkins exploit using mtasploit.
  8. SMB & netbios exploit using metasploit
  9. PUT method exploit using metasploit
  10. Wordpress exploit using metasploit
  11. Mysql exploit using metasploit
  12. jmx exploit using metasploit
  13. Exploit rails application using metasploit.
  14. tugzip exploitation using metasploit
  15. Elasticsearch exploit using metasploit
  16. Manageengine Desktop control 9 using metasploit. 16.Dos attack using Metasploit.

Speaker

Pratik

Certified Ethical Hacker,Certified Forensic Expert,Certified Information Security Consultant,Certified Network Defender.

Timing

Starts at Saturday September 29 2018, 10:00 AM. The sessions runs for about 6 hours.

Resources