Главная
Study mode:
on
1
Intro
2
Outline
3
Cyberattacks
4
Cyberattack Cycle
5
Remote Exploit
6
Use credentials/Pass the hash
7
Armitage Interface
8
Terms
9
Example Target: Metasploitable
10
Armitage Scanning
11
Armitage Exploitation
12
Armitage Post Exploitation
13
Example Post Exploitation
14
Maintaining Access
15
Meterpreter commands!!!
16
Screen Capture!!!
17
Reports
18
Demo Setup
19
Steps
20
References
Description:
Explore the comprehensive cycle of cyberattacks and penetration testing in this 54-minute lecture by Dr. Xinwen Fu from the University of Massachusetts, Lowell. Learn how to utilize Armitage, a GUI interface for the popular Metasploit tool, to perform information gathering, exploitation, and post-exploitation techniques. Discover the ease of conducting port scanning, hashdump, and password cracking with just a few clicks and commands. Gain insights into the Armitage interface, key terms, and practical examples using a Metasploitable target. Follow along as the lecture covers Armitage scanning, exploitation, and post-exploitation processes, including maintaining access and using Meterpreter commands. Understand the importance of screen capture and reporting in penetration testing. The lecture concludes with a demo setup, step-by-step instructions, and valuable references for further learning.

Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation

CAE in Cybersecurity Community
Add to list