23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCoursesOnline.Me] [Packtpub.Com] Hands-On Penetration Testing With Metasploit - [FCO]
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Put your defenses to the test with the Metasploit framework
Video Details
ISBN 9781789610512
Course Length 3 hours 36 minutes
Table of Contents
- INTRODUCTION TO THE METASPLOIT FRAMEWORK
- PENTESTING LAB SETUP
- INFORMATION GATHERING WITH METASPLOIT
- VULNERABILITY SCANNING WITH METASPLOIT
- EXPLOITATION WITH METASPLOIT
- POST-EXPLOITATION WITH METASPLOIT
- ADVANCED EXPLOITATION WITH METASPLOIT
Video Description
Metasploit is the best and most widely used tool for penetration testing, providing powerful attack simulations, security assessment management, and more. Metasploit is used by White Hat, and by Black Hat, hackers. Metasploit is a playground for hackers where they demonstrate their skill by protecting or damaging the target. In this course, you'll learn how to use Metasploit to enumerate services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. First, you'll explore several supporting tools on Kali Linux. Next, you'll explore how exploits and payloads work together to gain access to systems. Finally, you'll learn how Metasploit Framework works. By the end of this course, you'll have a better understanding of how to use Metasploit to quickly assess the security posture of systems and networks to reduce the risk of attack.
Style and Approach
This course is designed to help students understand Metasploit in a structured way, with less confusion. They will understand the use of exploits in different pentesting cases. After completing the course, they will feel confident about using the World's best pentesting framework
What You Will Learn
- Dealing with the use of exploit in Metasploit framework.
- Find and exploit vulnerabilities in networks and web applications effectively
- Perform Vulnerability assessment and Penetration testing with Metasploit
- Working with various kind of Operating Systems
- Perform Privilege Escalation in Machines using advance commands
- Attack on a remote machine using group of exploits
- Get complete access with the effective use of Metasploit commands
Authors
Sunil Gupta
Sunil Gupta. He is a Certified Ethical Hacker. Currently he teaches 50,000+ students online in 150+ countries.
He is a specialist in the Ethical Hacking and Cyber Security areas.
Author strengths –
- Vulnerability assessment
- Penetration testing
- Intrusion detection
- Risk identification
- Data analysis
- Reporting and briefing.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.us/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1 - Introduction to the Metasploit Framework/Exploit and Auxiliary.mp4
28.9 MB
1 - Introduction to the Metasploit Framework/Metasploit Framework Overview.mp4
16.1 MB
1 - Introduction to the Metasploit Framework/MSFconsole, MSFcli, and MSFencode.mp4
24.8 MB
1 - Introduction to the Metasploit Framework/The Course Overview.mp4
3.7 MB
2 - Pentesting Lab Setup/Installation of Kali Linux.mp4
25.8 MB
2 - Pentesting Lab Setup/Installation of Virtual Machine.mp4
30.3 MB
2 - Pentesting Lab Setup/Installation of Windows10.mp4
38.1 MB
3 - Information Gathering with Metasploit/Information Gathering.mp4
35.4 MB
3 - Information Gathering with Metasploit/Metasploit Port Scanners.mp4
31.6 MB
3 - Information Gathering with Metasploit/Port Scanning Techniques.mp4
13.8 MB
3 - Information Gathering with Metasploit/Port Scanning with Nmap.mp4
27.3 MB
4 - Vulnerability Scanning with Metasploit/Nessus Installation.mp4
33.9 MB
4 - Vulnerability Scanning with Metasploit/Scanning a Website for Vulnerabilities.mp4
43.6 MB
4 - Vulnerability Scanning with Metasploit/Using Nessus by Writing Metasploit.mp4
48.7 MB
4 - Vulnerability Scanning with Metasploit/Vulnerability Scanning.mp4
5.6 MB
5 - Exploitation with Metasploit/Exploitation Overview.mp4
7 MB
5 - Exploitation with Metasploit/Network Exploitation.mp4
39.1 MB
5 - Exploitation with Metasploit/Website Exploitation.mp4
43.5 MB
5 - Exploitation with Metasploit/Windows Exploitation.mp4
34.8 MB
6 - Post-Exploitation with Metasploit/Bypassing UAC.mp4
32.7 MB
6 - Post-Exploitation with Metasploit/Meterpreter Scripts.mp4
27.9 MB
6 - Post-Exploitation with Metasploit/Meterpreter.mp4
37.3 MB
6 - Post-Exploitation with Metasploit/Post-Exploitation – Overview.mp4
6.8 MB
7 - Advanced Exploitation with Metasploit/Client-Side Attack – Overview.mp4
50.4 MB
7 - Advanced Exploitation with Metasploit/MSFencode Attack.mp4
37.2 MB
7 - Advanced Exploitation with Metasploit/Social Engineering Toolkit.mp4
39.8 MB
7 - Advanced Exploitation with Metasploit/Social Engineering.mp4