Pentesting with Metasploit

From March 16, 2015 to March 17, 2015

This workshop will cover all steps and typical tasks of a penetration test using the Metasploit framework. All steps will be illustrated using different Metasploit functionality — starting with modules gathering information leading to extracting information using several compromised systems in the post-exploitation phase. Everything you learn will be wrapped up by challenge we prepared for you — including several real-world system that have to be hacked. If you want to take a deep dive into Metasploit, this workshop will fit your needs!


Agenda


Requirements:

Florian Grunow

Florian Grunow is a security analyst at ERNW. He holds a Master of Science degree in computer science with a focus on software engineering and medical devices.

Benedikt Troester

For two years, Benedikt Tröster is now part of the Virtualization and Cloud security team at ERNW as a Pentester and security analyst. During the last year he was able to attend conferences as a speaker and gather further knowledge in different security fields, including: Burp, Metasploit, Nmap, Sslyze, virtualization security, virtualization solutions (e.g. ESXi, Hyper-V and Openstack) and Software Hardening.