Ine/Elearning - eJPTv2 - Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eJPTv2-Notes
    • 1️⃣Assessment Methodologies & Auditing
      • 1.1 Information Gathering
      • 1.2 Footprinting & Scanning
      • 1.3 Enumeration
        • SMB Enum
        • FTP Enum
        • SSH Enum
        • HTTP Enum
        • MySQL Enum
        • SMTP Enum
      • 1.4 Vulnerability Assessment
      • 1.5 Auditing Fundamentals
    • 2️⃣Host & Network Penetration Testing
      • 2.1 System/Host Based Attacks
        • Windows Vulnerabilities
        • Linux Vulnerabilities
      • 2.2 Network Based Attacks
      • 2.3 The Metasploit Framework (MSF)
        • MSF Introduction
        • Information Gathering & Enumeration
        • Vulnerability Scanning
        • Client-Side Attacks
        • Exploitation
        • Post Exploitation
        • Armitage
      • 2.4 Exploitation
      • 2.5 Post-Exploitation
      • 2.6 Social Engineering
    • 3️⃣Web Application Penetration Testing
      • 3.1 Intro to Web App Pentesting
  • 🛣️RoadMap
  • 📔eJPT Cheat Sheet
Powered by GitBook
On this page
  1. eJPTv2-Notes
  2. Host & Network Penetration Testing

2.3 The Metasploit Framework (MSF)

Previous2.2 Network Based AttacksNextMSF Introduction

Last updated 1 year ago

⚡ Prerequisites

  • Basic familiarity with Linux & Windows

  • Basic familiarity with TCP & UDP protocols

📕 Learning Objectives

  • Understand, install, configure and use Metasploit Framework

  • Perform info-gathering, enumeration, exploitation, post exploitation with Metasploit

🔬 Training list - PentesterAcademy/INE Labssubscription required

  • ​​

  • ​​

  • ​​

  • ​​

  • ​​

  • ​​

  • ​​

  • ​​

  • ​​

  • ​​

  • ​​

📝
2️⃣
Metasploit Auxiliary modules
MITRE ATT&CK Linux Discovery
Metasploit Meterpreter
Linux Vulnerable Servers Exploitation - Metasploit
Linux Exploitation - Metasploit
Linux Post Modules - Metasploit
Win Basic Exploitation - Metasploit
Win Pentesting Basic Exploitation
Win Apps Exploits - Metasploit
Win Post Exploitation - Metasploit
Win Maintaining Access