Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers turning a 3Com exploit into a metasploit module. Participants learn step by step directions in setting a payload and targets to produce a metasploit module.
Module 1 - Linux
Module 2 - Programming
Module 3 - Metasploit
Module 4 - Information Gathering
Module 5 - Vulnerability Discovery/Scanning
Module 6 - Traffic Capture
Module 7 - Exploitation
Module 8 - Passwords
Module 9 - Advanced Exploitation
Module 10 - Post Exploitation
Module 11 - WebApps
Module 12 - Exploit Development
Founder and CTO at Shevirah and Bulb Security LLC
Subscribe to become an Insider Pro and get access to premium content such as: