Post-exploitation, command-and-control and SOCKS proxying with Metasploit Course
1 hour, 39 minutes
Course description
You've run the exploit.... Now what? Explore the post-exploitation landscape, including using Meterpreter and dealing with command-and-control and SOCKS proxying.Syllabus
Command-and-control, SOCKS proxies and pivoting with Metasploit
Video - 00:11:00
How to use the powerful Meterpreter payload to establish command-and-control and convert a compromised Windows target into a "dumb pipe/router".
Post-exploitation with Metasploit Meterpreter
Video - 00:51:00
What post-exploitation is, and how the Meterpreter's powerful features can aid penetration testers and ethical hackers in the post-exploitation phases of a penetration test.
Post-exploitation, command-and-control and SOCKS proxying with Metasploit overview
Video - 00:04:00
Using the open-source Metasploit Framework for post-exploitation activities including endpoint enumeration, privilege escalation, and network pivoting/proxying.
Penetration Testing with Metasploit - 4 - Post-Exploitation with the Meterpreter Lab
Lab - 00:30:00
In this lab, students will apply the concepts called 'Post-Exploitation, Command-and-Control, and SOCKS proxying with Metasploit' and perform the following tasks- We will create Windows malware using msfvenom- Host the malware using Metasploit's 'web_delivery' module and pythons 'http.server' module.- Execute the malware on our Windows target to establish a reverse shell- Upgrade our basic reverse shell to the versatile Meterpreter payload- Use process migration to move to a more stable process that isn't likely to be closed by the victim.- Use the Meterpreter to load additional functionality- Investigate privilege escalation opportunities- Harvest credentials via dumping the local Security Account Manager (SAM) to retrieve password representations (hashes)- Capture keystrokes to collect passwords- Take screenshots- Upload and download files- Modify malware metadata to fool investigators- Enabling wdigest- Load the Mimikatz 'kiwi' meterpreter extension and capture credentials- Clear event logs
Pentesting in metasploit course 4 assessment
Assessment - 6 questions
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps