Video Description

This lesson covers turning a 3Com exploit into a metasploit module. Participants learn step by step directions in setting a payload and targets to produce a metasploit module.

Course Modules

Advanced Penetration Testing

Instructed By

Instructor Profile Image
Georgia Weidman

Founder and CTO at Shevirah and Bulb Security LLC

INSIDER PRO

$99/mo

Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support
Subscribe