Offensive Security
  • Blog
  • Courses
    • Online Courses
      • Penetration Testing with Kali Linux (PWK)
      • Offensive Security Wireless Attacks (WiFu)
      • Cracking the Perimeter (CTP)
    • Live Courses
      • Advanced Windows Exploitation (AWE)
      • Advanced Web Attacks and Exploitation (AWAE)
    • In-House Training
      • In-House Security Training
  • Certifications
    • OSCP Certified Professional
    • OSWP Wireless Professional
    • OSCE Certified Expert
    • OSEE Exploitation Expert
    • OSWE Web Expert
  • Online Labs
    • Virtual Pentesting Labs
  • Penetration Testing
    • Penetration Testing Services
    • Advanced Attack Simulation Services
    • Application Security Assessment Services
  • Projects
    • Kali Linux
      • Kali Linux VM Downloads
      • Kali Linux ARM Images
      • Kali NetHunter Downloads
    • Metasploit Unleashed
    • The Exploit Database
    • Google Hacking Database (GHDB)
    • BackTrack Linux
  • About
    • Offensive Security Vision
    • Contact Us
    • Bug Bounty Program
    • Course Reviews
    • Offsec FAQ

Metasploit Unleashed

The ultimate guide to the Metasploit Framework

Metasploit Unleashed - Free Online Security Training

Free Online Security Training – Metasploit Unleashed

The Metasploit Unleashed (MSFU) ethical hacking training course is provided free of charge to the community by Offensive Security in an effort to raise funds and awareness for underprivileged children in East Africa. Through a heart-warming effort by several security professionals, we are proud to present the most complete and in-depth Metasploit Guide available for the Metasploit Project. This course will teach you how to use Metasploit in a structured and professional manner, including both the Metasploit Framework and Metasploit Pro editions, as well as an extensive overview on Metasploit Commands. If you’re looking for a thorough introduction to this popular penetration testing tool, you’ve come to the right place.

This free Metasploit training is a perfect starting place for information security professionals that want to learn penetration testing, but are not yet ready to commit to a paid course. Additionally, this free online computer security course makes a wonderful quick reference for advanced penetration testing professionals on how to use Metasploit. Many of the contributors to this course are also the authors of the No Starch Metasploit book, published in 2011.

Metasploit Unleashed, made for Hackers for Charity

If you enjoy this free online security training and find it useful, we ask that you make a donation to the Hackers For Charity organization. A sum of $9.00 will feed a child for a month, so any contribution amount is welcome and helpful. We hope you enjoy the Metasploit Unleashed course as much as we enjoyed making it.

MSFU Navigation

  • Metasploit Unleashed
  • Donate - Help Feed a Child
  • Introduction
    • Requirements
    • Metasploit Architecture
      • Filesystem And Libraries
      • Modules and Locations
      • Metasploit Object Model
      • Mixins and Plugins
  • Metasploit Fundamentals
    • Msfcli
    • Msfconsole
      • Msfconsole Commands
    • Exploits
      • Using Exploits
    • Payloads
      • Payload Types
      • Generating Payloads
    • Databases
      • Using the Database
    • Meterpreter
      • Meterpreter Basics
      • Python Extension
        • Python Extension Examples
  • Information Gathering
    • Port Scanning
    • Hunting for MSSQL
    • Service Identification
    • Password Sniffing
      • Extending Psnuffle
    • SNMP Sweeping
    • Writing Your Own Scanner
    • Windows Patch Enumeration
  • Vulnerability Scanning
    • SMB Login Check
    • VNC Authentication
    • WMAP Web Scanner
    • Working with NeXpose
      • NeXpose via MSFconsole
    • Working with Nessus
      • Nessus via MSFconsole
  • Writing a Simple Fuzzer
    • Simple TFTP Fuzzer
    • Simple IMAP Fuzzer
  • Exploit Development
    • Exploit Development Goals
    • Exploit Format
    • Exploit Mixins
    • Exploit Targets
    • Exploit Payloads
      • MSFvenom
        • MSFpayload
        • MSFencode
      • Alphanumeric Shellcode
      • MSFrop
    • Writing an Exploit
      • Getting a Shell
    • Using the Egghunter Mixin
      • Completing the Exploit
    • Porting Exploits
  • Web App Exploit Dev
    • Installing Dot Defender
    • Analyzing the Exploit
    • Skeleton Creation
    • Making a Log Entry
    • Hosting the JavaScript
    • Final Exploit
  • Client Side Attacks
    • Binary Payloads
      • Binary Linux Trojan
    • Client Side Exploits
    • VBScript Infection Methods
  • MSF Post Exploitation
    • Privilege Escalation
    • PSExec Pass the Hash
    • Event Log Management
    • Fun with Incognito
    • Interacting with the Registry
      • Persistent Netcat Backdoor
    • Enabling Remote Desktop
    • Packet Sniffing
    • Pivoting
      • Portfwd
    • TimeStomp
    • Screen Capture
    • Searching for Content
    • John the Ripper
  • Meterpreter Scripting
    • Existing Scripts
    • Writing Meterpreter Scripts
    • Custom Scripting
    • Useful API Calls
    • Useful Functions
  • Maintaining Access
    • Keylogging
    • Meterpreter Backdoor
      • Interacting With Metsvc
    • Persistent Backdoors
      • Meterpreter Service
  • MSF Extended Usage
    • Mimikatz
    • Backdooring EXE Files
    • Karmetasploit
      • Karmetasploit Configuration
      • Karmetasploit In Action
      • Karmetasploit Attack Analysis
    • MSF vs OS X
    • File-Upload Backdoors
    • File Inclusion Vulnerabilities
    • PHP Meterpreter
    • Building A Module
    • Payloads Through MSSQL
      • Creating Our Auxiliary Module
      • The Guts Behind an Auxiliary Module
    • Web Delivery
  • Metasploit GUIs
    • MSF Community Edition
      • MSF Community Scanning
      • MSF Community Exploitation
      • MSF Community Post Exploitation
    • Armitage
      • Armitage Setup
      • Armitage Scanning
      • Armitage Exploitation
      • Armitage Post Exploitation
  • Post Module Reference
  • Auxiliary Module Reference
    • Admin HTTP Auxiliary Modules
    • Admin MySQL Auxiliary Modules
    • Admin MSSQL Auxiliary Modules
    • Admin Postgres Auxiliary Modules
    • Admin VMWare Auxiliary Modules
    • Scanner DCERPC Auxiliary Modules
    • Scanner Discovery Auxiliary Modules
    • Scanner FTP Auxiliary Modules
    • Scanner HTTP Auxiliary Modules
    • Scanner MySQL Auxiliary Modules
    • Scanner MSSQL Auxiliary Modules
    • Scanner IMAP Auxiliary Modules
    • Scanner NetBIOS Auxiliary Modules
    • Scanner POP3 Auxiliary Modules
    • Scanner SMB Auxiliary Modules
    • Scanner SMTP Auxiliary Modules
    • Scanner SNMP Auxiliary Modules
    • Scanner SSH Auxiliary Modules
    • Scanner Telnet Auxiliary Modules
    • Scanner TFTP Auxiliary Modules
    • Scanner VMWare Auxiliary Modules
    • Scanner VNC Auxiliary Modules
    • Server Capture Auxiliary Modules
  • Recent Changes

Offensive Security Twitter Feed

Tweets by @offsectraining

Offsec Say Try Harder!

https://www.offensive-security.com/wp-content/uploads/2015/01/offensive-security-try-harder-2.0.mp3

Watch our Offsec Jam

Kali Linux Twitter Feed

Tweets by @kalilinux
  • Feedback
  • Privacy Policy
  • Terms and Conditions
  • Trademark Policy
  • RSS Feed
© Copyright 2016 Offensive Security