Metasploit Workshop

Date: 2024-03-13

Difficulty: Beginner

Delivered By: Matthew Grove

Overview

Dive into the tools and techniques used by cybersecurity professionals worldwide with us, as we investigate Metasploit and its many, many uses. In this session we will show you how to use Metasploit, a powerful penetration testing framework, to its full potential, and give you an hands-on experience with it! Whether you're a seasoned cyber security enthusiast or a curious beginner, this session offers something for everyone.

What to expect in this session:

🕵️ An intro to Metasploit

🛠️ Explanations and demos of how it works, including assessment, exploitation, and post-exploitation

🏆 A mini CTF with a variety of exploitable systems for all abilities

The CTF will provide an exciting opportunity to apply what you've learned in a simulated environment - work individually or in teams to solve real-world cybersecurity puzzles, showcasing your problem-solving abilities and strategic thinking!

Prerequisites

This session requires metasploit. The simplest way to get and use this tool is in a Kali VM (metasploit comes preinstalled), how to setup a Kali VM is described here. Alternativly metasploit can be downloaded here.

Session Resources

This session is available in three parts:

There are username and password wordlists that may be helpful.