Introduction
  • Introduction to Metasploit
  • legal disclaimer
A prefect Lab Setup for exploitation
  • Install and working of an Vmware for Network connection
  • Install and working of an kali linux OS
  • Creating payload msfvenom and Send into Server
Start with simple Exploitation of Operating Systems
  • Exploiting the windows XP vulnerability using payload
  • Exploiting the windows 7 vulnerability using payload
  • Exploiting the windows 10 vulnerability
Start Working on simple commands of metasploit
  • Getting System information
  • Know what the user is Doing on his PC
  • Information of keyboard (Key-logger)
  • SPY at the user Webcam
Work On the shell Commands
  • Networking Information using Network Commands
  • Enumerating the information using WMIC
Information Gathering of Target Machine
  • Getting targeted Machine Product Key
  • Directory Permission of User
  • usb history of an victim device
  • Checking the Application Installed Target Machine
  • Gathering lnk file of Users
Server Side All Port Scanning
  • File Transfer Protocol (FTP) Remote host 21
  • SSH Security Port Scanning 22
  • TELNET text based computer Ports 23
  • SMTP at client and server(Email) 25
Web Exploitation
  • webserver and websites
  • Web based Exploitation
  • Command line execution and Exploit web server
  • HTTP Brute directories of web server
  • HTTP directories in a given directory Path