-
Click here to register for a live workshop
-
Click here to watch a recording of this workshop
Metasploit - Configuration Best Practices
Understand how to leverage Metasploit Pro and Optimize your Security Testing
In this workshop, we’ll review the following items to put you in the best position to use Metasploit for your security testing needs:
- Project Creation - creating your first workspace
- Explanation of using Wizards vs manual project creation
- Reconnaissance
- Running an Nmap discovery scan
- Importing [InsightVM] vulnerability findings
- Automated Exploitation
- Choosing a “reliability ranking” to ensure safe testing
- Challenges with remote exploitation
- Explaining Modules - auxiliary, exploit, and post
- Bruteforcing to test out password strength and complexity
- Choosing what services to target
- Applying mutations to username/password attempts
- Task chaining to schedule and automate tests
- Reporting Options
Desired Outcome
To leave more comfortable with creating a project from scratch and configuring your desired tests with confidence and understanding