Anatomy of a Cyber Attack: Beginner Hacking with Metasploit!
This is a subtitle. Get more detailed about your course here!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Introduction (...and now the moment you've all been waiting for!)
Creating Our Lab Environment (...our own special little place to hack)
Installing Kali Linux (...our attack platform)
An Important Course Message
Installing Windows (…our first victim)
Installing Metasploitable (...another victim for our amusement)
The CIA Triad (...we aren't talking about intelligence)
Hackers, Crackers, and Attackers (...Oh My!)
The Hacker's Methodology (...a malicious mindset)
Ethical Hackers (...isn't that an oxymoron?)
Reconnaissance (...I can see you but you can't see me)
Lab (...Getting Creepy)
Lab (...OSINT with CentralOps)
Scanning and Enumeration (...poke, poke, poke)
Lab Introduction and Setup (...you've got to find the hole)
Lab (...you've got to find the hole)
Gaining Access (...finding a foothold)
Buffer Overflows (...dissecting the exploit)
Lab: Buffer Overflows (...dissecting the exploit)
Introduction to Shellcode (...finding my foothold)