Open-source intelligence gathering (OSINT) and reconnaissance with MetasploitThis course will show students how to install the Metasploit framework and how to use it for passive and active open-source intelligence gathering.
Course descriptionExplore open-source intelligence gathering with Metasploit. We will learn how to use the Metasploit framework to enumerate DNS settings, review SSL/TLS configurations, harvest email addresses, identify subdomains, run port scans, enumerate users and interact with the powerful Shodan search engine, all from within the framework.
Active information gathering
Video - 00:26:00
Using Metasploit for active recon.
Passive information gathering
Video - 00:26:00
Using Metasploit for passive recon.
Installing and updating Metasploit on Windows and Linux
Video - 00:18:00
How to install, update and run the Metasploit Framework on both Windows and Linux operating systems.
Open-source intelligence gathering (OSINT) and reconnaissance with Metasploit overview
Video - 00:10:00
Exploring how to use the Metasploit Framework for OSINT and reconnaissance. This is the first and most important phase of a penetration test.
Penetration Testing with Metasploit - 1 - Information Gathering Lab
Lab - 00:30:00
In this lab, students will apply what they learned in the first video course 'Open Source Intelligence Gathering with Metasploit' and perform the following tasks:- Students will use auxiliary modules to identify live systems in the LAB environment,- Discover common services such as Secure Shell, Web, and FTP (File Transfer Protocol),- Passively sniff the network for clear text passwords- Hunt for systems running web services on common ports like 80 and 443- Scan for additional services typically used for remote administration and logon including Remote Desktop Protocol, VNC and MySQL, all from within the framework.
Pentesting in Metasploit course 1 assessment
Assessment - 6 questions
Plans & pricing
- Team administration and reporting
- Dedicated client success manager
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps