On This Page

Abilities Inc - Metasploit Mastery

EGYPT & MUBIX | August 6-7



Overview

Egypt and Mubix have combined their knowledge of the innards of the Metasploit Framework and Adversarial Red Teaming to introduce one of the most intense classes on attacking networks. Coverage on everything from hacking up your own plugins to owning a whole networking without drawing a single drop of buffer overflow blood. This surgical strike upon your frontal lobe will leave you whistling ruby and spurting root shellz from your veins.

Course Syllabus:

Day 1:
  • Setup and Installation
  • Demo! Pwning the World
  • Ruby crash course
  • Design and Architecture
  • Lunch/Framework Basic Usage
  • Aux Modules
  • Exploit Modules

Day 2:
  • Post exploitation
  • Post Modules
  • Question and Answer
  • CTF!

Who Should Take this Course

Those looking to learn more about how to make Metasploit bend to their will.

Student Requirements

  • Basic understanding of Metasploit
  • TCP/IP basics
  • Network configuration in Windows and Linux/OSX
  • Experience with programming (Ruby preferred)

What Students Should Bring

  • Laptop with 20 GB minimum free space
  • Ethernet adapter
  • Virtualization software capable of running VMDKs
  • A fresh Kali Linux VM, and a Windows VM (Metasploitable3)
  • Latest version of Burp Suite - (Free or Pro)
  • A text editor you are comfortable writing code in (instructors recommend Sublime Text 3 or Vim)
  • Metasploitable2 VM downloaded and functional: http://sourceforge.net/projects/metasploitable/files/Metasploitable2/

Setup instructions will be sent to the student prior to the class.

What Students Will Be Provided With

Course Materials and access to the Metasploit Mastery wiki

Trainers

James Lee, better known as egypt, is a pentester for Black Hills Information Security. He has been contributing to Metasploit for nearly a decade, including almost eight years as a full-time developer for Rapid7 before coming to BHIS. He believes strongly that open source security tools are vital to the long term health of the internet and has been Note that egypt is not Egypt. The two can be distinguished easily by their relative beards - Egypt has millions, while egypt only has the one.

Rob Fuller has over 11 years of experience covering all facets of information security. He has been behind the lines helping to design, build, and defend the US Marine Corps, US Senate, and Pentagon networks - as well as performing penetration tests and Red Team assessments against those same networks. More recently, Rob has performed numerous successful Red Team assessments against commercial Fortune 50 companies representing some of the best defensive teams in the industry. Rob's experience and expertise ranges from embedded and wireless devices in industrial control system networks to standard corporate IT infrastructures and domains. He is a frequent speaker at a number of well-known security conferences, including ShmooCon, DefCon, DerbyCon, CarolinaCon, Area41, RVASec, and HackCon; and teaches both the Metasploit Basics and Mastery classes at BlackHat USA. He has also served as a technical advisor for HBO's show Silicon Valley and hosts his own show called "Metasploit Minute" for Hak5 (Discovery Channel). Rob has acquired a number of certifications and awards over the years, but the ones he holds above the rest are father, husband, and United States Marine