Penetration Testing with Metasploit (Metasploit資安攻防實務)
- Teaching Goal:
This course
will prepare students to face everyday cyberattacks by simulating
real-world scenarios. Complete with step-by-step explanations of
essential concepts and practical examples, this course will help you gain insights into programming Metasploit modules and carrying out exploitation, as well as building and porting various kinds of exploits in Metasploit.
By giving you the ability to perform tests on different services,
including databases, IoT, and mobile, this course will help you get to grips with real-world, sophisticated scenarios where performing penetration tests is a challenge. You'll then learn a variety of methods and techniques to evade security controls deployed at a target's endpoint. As you advance, you'll script automated attacks using CORTANA and Armitage to aid penetration testing by developing virtual bots and discover how you can add custom functionalities in Armitage. Following real-world case studies, this book will take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit 5.0 framework.
- Textbook: Nipun Jaswal,
"Mastering
Metasploit", 4th Edition, Packt Publishing, June 2020.
- References:
- David Kennedy,Jim O’Gorman, Devon Kearns,Mati Aharoni,
"
Metasploit: The Penetration Tester's Guide",
No Starch Press © 2011.
(332 pages)
- OccupyTheWeb, "Linux Basics for Hackers: Getting
Started with Networking, Scripting, and Security in
Kali",
No Starch Press © 2019. (248 pages)
- Gus Khawaja, "Kali
Linux Penetration Testing Bible", Wiley-VCH © 2021.
(512 pages)
- Grading Criteria:
- Oral Presentation (30%)
- Exams (20%)
- Participation (10%)
- Term Project (40%)
Syllabus
- Introduction
- Approaching a Penetration Test Using Metasploit
- Reinventing Metasploit
- The Exploit Formulation Process
- Porting Exploits
- Testing Services with Metasploit
- Virtual Test Grounds and Staging
- Rehearsal (for midterm)
- Midterm Exam
- Client-Side Exploitation
- Metasploit Extended
- Evasion with Metasploit
- Metasploit for Secret Agents
- Visualizing Metasploit
- Tips and Tricks
- Final Exam
- Term Project Presentation (1)
- Term Project Presentation (2)
Hands-On
- NCHC CDX 雲端資安攻防平台
-
CDX 3.0 新功能使用教學
技術支援聯絡窗口:cdx_support@narlabs.org.tw
- CDX_雲端資安攻防平台
教學影片
- 雲林科技大學 《網路攻防技術》
- rootme 、hack the box 、hackthesite