​​​​​This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Metasploit Scenario. This scenario is a training module that provides an introduction to Metasploit, "a powerful, free, and open-source penetration testing tool used by both hackers and security professionals to probe and exploit security weaknesses." On completion of the scenario, students will be able to:

  • Explain Metasploit’s purpose
  • Define Metasploit terminology
  • Discuss basic Metasploit usage
  • Demonstrate basic Metasploit usage

Collection Contents:

This scenario includes a PowerPoint presentation, practices for learning, a scenario overview, lab instructions, lab questions and answers, and a document with a link to a corresponding video lesson. The presentation covers the four previously mentioned learning outcomes, covering Metasploit functions such as exploit options, load modules, payload types, and more.

The 3-page scenario overview includes a summary of the scenario, learning outcomes, a list of systems used, a description of the general lab, a diagram of setup and deploy, and a list of resources for more information. PDF and Word copies are included.

The 8-page lab includes a scenario overview, lab setup information, and lab instructions. In the lab, "students will use Metasploit to create a network map, confirm a system vulnerability then use that vulnerability to exploit a system." Throughout the lab, students will perform basic module and payload searches in Metasploit, use Metasploit's build-in help functionality, and configure and use a database to store Metasploit data. PDF and Word copies are included.

The lab form includes six questions requiring either written responses or screenshots of Metasploit. A 3-page answer sheet is also provided. Both documents include PDF and Word copies.

The learning standards and best practices document includes education standards for penetration testing and flaw remediation. PDF and Word copies are included.

For orientation purposes the Metasploit-Overview.pdf is included as a separate attachment and offers a sample of the type of material included in this learning module.

Below is a list of the files contained within the .zip attachment. The size of each file is included in parenthesis.

metasploit-ate (14 files, 8.9 MB)

  • Metasploit Basics (Metasploit-Background.pdf 546 KB)
  • Metasploit Basics (Metasploit-Background.pptx 3 MB)
  • Wireshark NIST Standards and other best practices (IndustrialNetworkingBasics-BestPractices.docx 13 KB)
  • Wireshark NIST Standards and other best practices (IndustrialNetworkingBasics-BestPractices.pdf 81 KB)
  • Metasploit Lab Form (Metasploit-lab-answers.doc 527 KB)
  • Metasploit Lab Form (Metasploit-lab-answers.pdf 234 K KB)
  • Metasploit Lab Form (Metasploit-lab-form.doc 45 KB)
  • Metasploit Lab Form (Metasploit-lab-form.pdf 92 KB)
  • Lab 1 (metasploit-lab.docx 2.9 MB)
  • Lab 1 (metaspolit-lab.pdf 783 KB)
  • Metasploit Basics (Metasploit-Overview.docx 339 KB)
  • Metasploit Basics (Metasploit-Overview.pdf 177 KB)
  • Video Links (metasploit-Videos.docx 14 KB)
  • Video Links (metasploit-Videos.pdf 21 KB)
Add Comment

Comments

(no comments available yet)