Metasploit mailing list archives

Metasploit Mastery at InfoSec SouthWest, April 2nd and 3rd


From: egypt () metasploit com
Date: Wed, 15 Feb 2012 23:00:10 -0700

Come play A Game of Shells with egypt and mubix, in Austin, TX, April
2nd and 3rd for the best Metasploit training available.

Metasploit is the largest Ruby project in the world, which may seem
daunting to many would-be Metasploit contributors, causing some to
never pick up an editor and get their hands dirty. Never fear -- even
if you have no experience writing Ruby, the amount of Ruby needed to
get started writing your own modules is easily acquirable within the
span of this two-day class.  As part of this course, students will
learn the basics of Ruby as well as advanced techniques for taking
advantage of the vast supporting code that Metasploit offers.

From novice to advanced user, this course provides the path,
experience, and material to make even the most novice Metasploit user
bypass AV with the best of them. Students will quickly come to
understand that Metasploit is more than just a pile of exploits like
MS08_067. Using the tools for gaining access where none is provided,
building custom tools on the fly with a few lines of code, and
understanding the scaffolding that holds them together, are just a few
of the things students will learn on their journey to becoming
masters.

From fuzzing, AV bypass, post-exploitation, and exploit development,
even systems administration, this class covers as much about the
framework and its myriad uses as could possibly be smashed into 2
days. Expect homework, long nights, some never-before released modules
and one very epic sax guy.

April 2nd and 3rd are right around the corner and seats are limited.
For more information and to sign up check out the following link: (We
swear it isn’t malicious)
http://www.infosecsouthwest.com/training.html#metasploitmastery



We hope to see you there,
egypt and mubix
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: