Pentesting with Metasploit

From March 14, 2016 to March 15, 2016

This workshop will cover all steps and typical tasks of a penetration test using the Metasploit framework. All steps will be illustrated using different Metasploit functionality — starting with modules gathering information leading to extracting information using several compromised systems in the post-exploitation phase. Everything you learn will be wrapped up by challenge we prepared for you — including several real-world system that have to be hacked. If you want to take a deep dive into Metasploit, this workshop will fit your needs!

Agenda

Requirements:

Jayson Salazar

Jayson Salazar currently works as a penetration tester at the ERNW GmbH. The focus of his work lies mostly in the areas of application and network security. In addition to security trainings, he actively takes part in security assessments of network infrastructures and web applications in enterprise environments.

Benedikt Troester

For two years, Benedikt Tröster is now part of the Virtualization and Cloud security team at ERNW as a Pentester and security analyst. During the last year he was able to attend conferences as a speaker and gather further knowledge in different security fields, including: Burp, Metasploit, Nmap, Sslyze, virtualization security, virtualization solutions (e.g. ESXi, Hyper-V and Openstack) and Software Hardening.