[TriLUG] 10/4 ISSA - Building Metasploit Skills

Alan Porter porter at trilug.org
Mon Sep 24 15:48:12 EDT 2012


Our February 2011 meeting on "Backtrack and Metasploit" was one of the 
most widely-attended TriLUG meetings in recent history... we had over 
100 people at our meeting!

The very same presenter, Ryan Linn, is putting on another Metasploit 
program, this time for ISSA.

 From http://raleigh.issa.org/events.html ....


*October Chapter Meeting * - October 4, 2012, at 6:00 PM

/Sponsored By:/ *Raleigh ISSA Chapter <http://raleigh.issa.org/> *

/Location:/ McKimmon Center <http://www.mckimmon.ncsu.edu/mckimmon/> in 
Raleigh, North Carolina located 
<http://raleigh.issa.org/directions.html> on the campus of NC State 
University.

/Presentation:/*Building Metasploit Skills *

There are books, articles, and demos online on how to use Metasploit, 
the open source penetration testing toolkit. Metasploit is a tool to 
leverage community contributed exploits and tools to profile systems, 
fingerprint services, and then exploit software vulnerabilities and 
configuration weaknesses. Figuring out how to leverage Metasploit is one 
of the hardest steps that new penetration testers have. Come see how to 
build your skills using the Metasploitable distribution, and then see 
how these same skills are applicable in a real penetration test. Once 
we've gone through some basic exploitation, we will do a 15 minute 
scenario of how quickly a penetration test can turn from basic network 
access to domain admin access and more. While many demonstrations have 
contrived scenarios, this will be a walkthrough of one of the most 
common scenarios we see in daily penetration testing, and best of all, 
it requires no typical exploits to work, just configuration weaknesses.

If you decide you want some hands on experience once you've seen some of 
the basics, DC919 has an open invitation to the community to attend a 
workshop on Learning Metasploit with Metasploitable. This workshop will 
be a two hour hands on workshop where you will enumerate open services, 
find vulnerabilities, exploit them to gain access, and then elevate 
access on a target system. For more information go to 
http://www.dc919.org <http://www.dc919.org>.

/Presenter: /*Ryan Linn*, Senior Consultant, Trustwave's SpiderLabs

Ryan Linn is a Senior Consultant with Trustwave's SpiderLabs 
<https://www.trustwave.com/spiderlabs/> - the advanced security team 
focused on penetration testing, incident response, and application 
security. Ryan is a penetration tester, an author, a developer,and an 
educator. He comes from a systems administration and Web application 
development background, with many years of IT security experience. Ryan 
currently works as a full-time penetration tester and is a regular 
contributor to open source projects including Metasploit and BeEF, the 
Browser Exploitation Framework.



-- 
# ????o? u?l?





More information about the TriLUG mailing list