⚡ Prerequisites
- Basic familiarity with Linux & Windows
- Basic familiarity with TCP & UDP protocols
📕 Learning Objectives
- Understand, install, configure and use Metasploit Framework
- Perform info-gathering, enumeration, exploitation, post exploitation with Metasploit
🔬 Training list - PentesterAcademy/INE Labs
subscription required
- Metasploit Auxiliary modules
- MITRE ATT&CK Linux Discovery
- Metasploit Meterpreter
- Linux Vulnerable Servers Exploitation - Metasploit
- Linux Exploitation - Metasploit
- Linux Post Modules - Metasploit
- Win Basic Exploitation - Metasploit
- Win Pentesting Basic Exploitation
- Win Apps Exploits - Metasploit
- Win Post Exploitation - Metasploit
- Win Maintaining Access
{% content-ref url="https://app.gitbook.com/s/PNcjhcAuvH4mlZKYrNu3/readme/host-and-network-penetration-testing/2.3-the-metasploit-framework-msf" %} 2.3 The Metasploit Framework (MSF) {% endcontent-ref %}