Many enterprises today face regulatory or compliance requirements that mandate regular penetration testing and vulnerability assessments. Commercial tools and services for performing such tests can be expensive. While really solid free tools such as Metasploit, are available, many testers do not understand the comprehensive feature sets of such tools and how to apply them in a professional-grade testing methodology. Metasploit was designed to help testers with confirming vulnerabilities using an Open Source and easy-to-use framework. This course will help students get the most out of this free tool.
This class will show students how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen, according to a thorough methodology for performing effective tests. Students who complete the course will have a firm understanding of how Metasploit can fit into their penetration testing and day-to-day assessment activities. The course will provide an in-depth understanding of the Metasploit Framework far beyond simply showing attendees how to exploit a remote system. The class will cover exploitation, post-exploitation reconnaissance, token manipulation, spear-phishing attacks, and the rich feature set of the Meterpreter, a customized shell environment specially created for exploiting and analyzing security flaws.
The course will also cover many of the pitfalls that a tester may encounter when using the Metasploit Framework and how to avoid or work around them, making tests more efficient and safe.
Course Syllabus
SEC580.1: Metasploit Kung Fu for Enterprise Pen Testing: Day 1
SANS Security 580 is a hands-on class with many labs. Please, review the laptop requirements before attending class!
Overview
Day 1 of SANS Security 580: Metasploit Kung Fu for PenetrationTesters is designed to help attendees master the most heavily used exploitation framework on the planet and see how they can wield it effectively in professional penetration testing. We analyze some of the most powerful and yet often overlooked capabilities of the framework with numerous exercises that make this class one of the most hands-on courses ever developed by SANS.
In SEC580.1, you will go from zero to exploit and beyond faster than you ever thought possible. For example, after this day of class, you will understand the Ruby foundations of Metasploit and how interacting with these underpinnings will greatly optimize and enhance your testing activities. Further, you will understand how far you can extend your exploitation activities through the effective use of some of the late-breaking features of the amazing Meterpreter. Finally, have you ever wondered how you can compromise an entire Domain from simple Windows system access? After this day you will know exactly how to achieve this kind of result. After all, shell is only the beginning.
CPE/CMU Credits: 6
Topics
SEC580.2: Metasploit Kung Fu for Enterprise Pen Testing: Day 2
Overview
In SANS Security 580.2, we build upon the deep foundations of Day 1 to see how Metasploit can be used within a penetration tester's ecosystem of tools and techniques to attack systems in new and creative ways. We'll analyze the activities of the most effective bad guys to see how they target enterprises via complex and often non-traditional attack vectors so that we can model their behaviors in our penetration testing processes. Client-side attacks launched via email, phishing, and document payload attacks are currently some of the most heavily used attack vectors by the bad guys. They use these techniques because they almost always work. The course shows penetration testers how to wield such attacks with the goal of determining the business implications of vulnerabilities, all with the goal of improving the target organization's security stance.
We'll also cover how Metasploit can effectively integrate with tools like NeXpose, Nmap, and Nessus to manage large scan results to find exactly which system(s) you wish to exploit. We also cover how Metasploit can become a main component of your wireless penetration testing regimen and how Metasploit can be used to attack databases and web applications.
CPE/CMU Credits: 6
Topics
Who Should Attend