Exploitation Basics
Discover the art of exploitation by leveraging a real-world vulnerability. Next, explore the exploitation features of the Metasploit framework.
In this module, we present the foundational knowledge of exploiting vulnerabilities. We exploit a vulnerability and compromise a machine without using any exploitation framework. Then, we learn how to use Metasploit, a widely used framework that simplifies the process of exploiting vulnerabilities. Ultimately, you will use the knowledge learned in the module to exploit a vulnerable Windows machine.
0%
Moniker Link (CVE-2024-21413)
Leak user's credentials using CVE-2024-21413 to bypass Outlook's Protected View.
0%
Metasploit: Introduction
An introduction to the main components of the Metasploit Framework.
0%
Metasploit: Exploitation
Using Metasploit for scanning, vulnerability assessment and exploitation.
0%
Metasploit: Meterpreter
Take a deep dive into Meterpreter, and see how in-memory payloads can be used for post-exploitation.
0%
Blue
Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
