Data management, network and vulnerability scanning Course

This course will show students how to use Metasploit's built-in support for databases and workspaces to keep organized during a penetration test.

1 hour, 48 minutes

Course description

This course explores Metasploit and data organization during a pentest. We will cover network and vulnerability scanning via auxiliary modules that identify open ports and listening services, run a Nessus vulnerability scan via Metasploit and how to import data from third-party tools like Nmap into the Database. We will also show basic database usage and some time-saving tips and tricks along the way.

Syllabus

Network scanning with Metasploit, part 2

Video - 00:10:00

How to use Metasploit for network scanning, how to import network scan data from third-party tools like Nmap into the database and how to search through it to find the data you're looking for.
Web application scanning with Metasploit

Video - 00:16:00

How to use built-in Metasploit modules for web application scanning.
Vulnerability scanning with Nessus using Metasploit

Video - 00:16:00

How to perform Nessus vulnerability scans from within the Metasploit Framework using the Nessus bridge.
Network scanning with Metasploit

Video - 00:11:00

How to use Metasploit for network scanning, how to import network scan data from third-party tools like Nmap into the database and how to search through it to find the data you're looking for.
Data management with Metasploit

Video - 00:18:00

How to set up and use Metasploit to organize your penetration testing data collected using databases and workspaces.
Data management, network and vulnerability scanning overview

Video - 00:04:00

Using Metasploit to keep data organized, perform vulnerability scans and network scans with Metasploit, and how to import and review data from third-party tools such as Nmap and Nessus into an existing database.
Penetration Testing with Metasploit - 2 - Data Management, Network and Vulnerability Scanning Lab

Lab - 00:30:00

In this lab, students will apply what they learned in the second course 'Data Management, network and vulnerability scanning with Metasploit' and perform the following tasks:- Students will use Metasploit's built-in support for databases and work spaces to keep organized during a Penetration test.- Manually manage data in the database by adding and removing data.- Run network scans against Linux and Windows targets that will automatically update the database.- Import data from 3rd party tools like Nmap into the database.- Use db_nmap for vulnerability scanning with automatic database updating.- Use wmap for web application vulnerability scanning without the need for a web browser, all from within the framework.
Pentesting in metasploit course 2 assessment

Assessment - 6 questions

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust