Learning Metasploit Exploitation and Development
Installing Oracle VM VirtualBox
Installing WindowsXP on Oracle VM VirtualBox
Installing BackTrack5 R2 on Oracle VM Virtual Box
Metasploit Framework Organization
Metasploit interfaces and basics
Vulnerability Scanning and Information Gathering
Information Gathering through Metasploit
Report importing in Metasploit
Post Exploitation – Privilege Escalation
Understanding Privilege Escalation
Post Exploitation – Cleaning Up Traces
Disabling firewalls and other network defenses
Post Exploitation – Pivoting and Network Sniffing
Exploit Research with Metasploit
Exploit writing tips and tricks
Using Social Engineering Toolkit and Armitage