Video Description

This lesson covers turning a 3Com exploit into a metasploit module. Participants learn step by step directions in setting a payload and targets to produce a metasploit module.

Course Modules

Advanced Penetration Testing

Instructed By

Instructor Profile Image
Georgia Weidman

Founder and CTO at Shevirah and Bulb Security LLC



Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support