Scanning and Reconnaissance with Metasploit
Category: Tutorials
- views: 30
- date: 17 November 2024
- posted by: AD-TEAM

Scanning and Reconnaissance with Metasploit
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 35m | 118 MB
Instructor: Dale Meredith
This course will teach you how to effectively use the Metasploit Framework for network scanning and reconnaissance, key components of penetration testing.
What you'll learn
In this course, Scanning and Reconnaissance with Metasploit, you'll learn how to conduct network scanning and reconnaissance using the Metasploit Framework, one of the most powerful tools for penetration testers.
First, you'll explore the different types of scanning modules available within Metasploit and learn how to differentiate between active and passive reconnaissance techniques. Next, you'll discover how to identify live hosts and open ports using network discovery and enumeration tools. Finally, you'll learn how to use Metasploit's auxiliary modules to gather additional reconnaissance data and assess vulnerabilities.
When you're finished with this course, you'll have the skills and knowledge to perform effective reconnaissance and scanning, essential components in the penetration testing process.
More Info

FileAxa
RapidGator
FileStore
TurboBit
We need your support!
Make a donation to help us stay online
Bitcoin (BTC)
bc1q08g9d22cxkawsjlf8etuek2pc9n2a3hs4cdrld
Bitcoin Cash (BCH)
qqvwexzhvgauxq2apgc4j0ewvcak6hh6lsnzmvtkem
Ethereum (ETH)
0xb55513D2c91A6e3c497621644ec99e206CDaf239
Litecoin (LTC)
ltc1qt6g2trfv9tjs4qj68sqc4uf0ukvc9jpnsyt59u
USDT (ERC20)
0xb55513D2c91A6e3c497621644ec99e206CDaf239
USDT (TRC20)
TYdPNrz7v1P9riWBWZ317oBgJueheGjATm
Related news:
Information |
|||
![]() |
Users of GUESTS are not allowed to comment this publication. |