Requirements
- You shoud know About how to use Android Phone.
Course content
Introduction
Metasploit
AUXILIRY MODULES METASPLOIT
Http enum_wayback auxiliary scanner
Endpoint_mapper - Scanner DCERPC Auxiliary Modules
Autopwn - auxiliary scanner
Email harvesting Using Metasploit
SSH version Scanner
FTP Version Scanning
Heartbleed Vulnerability(openssl scanner)
Nmap
Checking the status of target Machine
Checking the ports of target Machines
Miscellaneous Hackings
DDOS Attack
SQL mapping
Finding Location
Web Scanning
Phishing Attack
Brute Force Attack
Installation SEtoolkit
