Ethical Hacking & Penetration Testing with Kali Linux
3.7 (3 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
21 students enrolled

Ethical Hacking & Penetration Testing with Kali Linux

End-to-End Penetration Testing solutions: Discover the secrets of Pentesting using Kali Linux
3.7 (3 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
21 students enrolled
Created by Packt Publishing
Last updated 3/2019
English
English [Auto-generated]
Current price: $129.99 Original price: $199.99 Discount: 35% off
17 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 14 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Crack Wireless network access points in the area using services such as ArioDump, John the Ripper, and even Cain & Abel!
  • Perform a flawless reconnaissance with methods that include NSLookup, WhoIS, NetCraft, theHarvester, and more!
  • Perform Password Cracking Techniques, Wifi hacking to learn wireless penetration techniques
  • Find internal hosts, identify internal services, and locate directory services
  • Extract and remove log file information from a system
  • Test your website's vulnerabilities by utilizing tools such as WPScan, Burp Suite, and XSSER!
  • Learn Various Information Gathering tools techniques.
  • Perform Network and Web Vulnerability Analysis.
  • Learn Database Pentesting Techniques
Requirements
  • Some prior exposure to the basics of Kali Linux is assumed.
  • Basic understanding of penetration testing/ethical hacking will be beneficial but not necessary.
Description

Kali Linux has gained popularity over the last few years with the rise of hacker groups (Anonymous, Lizard Squad, Ghost Squad Hackers, and others). Kali Linux is rated as the #1 security operating system for hackers. In view of all this, companies are hiring hackers just like you to perform network and website vulnerability testing to help prevent hackers from getting in. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites.

This comprehensive 3-in-1 course follows a step-by-step practical approach to discover the secrets of Pentesting using Kali Linux and gain access to a system using a portfolio of different techniques. To begin with, you’ll understand virtual machines and install Kali Linux and test your website's vulnerabilities by utilizing tools such as WPScan, Burp Suite etc. You’ll also learn MITM and Social Engineering Attack as well as perform Exploitation and Post Exploitation Attack. Moving further, you’ll learn to Generate Final Reports of Penetration Testing. Finally, you’ll learn what type of evidence is left behind after an attack to minimize evidence left behind on a targeted system.

Towards the end of this course, you'll discover the secrets of Pentesting using Kali Linux and gain access to a system using a portfolio of different techniques.

Contents and Overview

This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Kali Linux Penetration Testing Recipes, covers End-to-End penetration testing solutions. This course covers several great resources within Kali Linux and you'll use them to perform a full website and server vulnerability test, brute-force your way past passwords, search for back-doors, and other tasks. Finally, you'll create a professional report and hand it to your client.

The second course, End-to-End Penetration Testing with Kali Linux, covers discovering the secrets of Pentesting using Kali Linux. You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested, and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access to compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pen testing tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.

The third course, Gaining Access and Covering Your Tracks with Kali Linux, covers gaining access to a system using a portfolio of different techniques. This course covers how to gain access to a system using a portfolio of different techniques, each designed to approach the problem from a different angle. In this course, we will explore the third and fourth phases of a pentest: exploiting access and covering tracks. This course starts with gaining Remote access using netcat, HTTP tunnels, and executing commands. You will further learn how to crack passwords to gain access to a system using brute-force attacks and rainbow tables. By the end of this course, you'll have learned how to extract and remove log file information from a system.

Towards the end of this course, you'll discover the secrets of Pentesting using Kali Linux and gain access to a system using a portfolio of different techniques.

About the Authors

  • Aubrey Love is a certified website developer, avid hacktivist, and published author. He has scoped out many scenes and picked up a trade or two. During his journey as a website and server administrator, he has learned how to perform his own penetration testing. This has taken him to new levels where he has helped other organizations and companies to meet their server and website security demands. Searching for weaknesses in a website or server is a game he enjoys playing—ethically, of course.

  • Sunil Gupta is a certified ethical hacker. Currently, he teaches 45,000+ students online in 150+ countries. He is a specialist in ethical hacking and cybersecurity. His strengths lie in vulnerability assessment, penetration testing, intrusion detection, risk identification, data analysis, reporting, and briefing.

  • Sean Oriyano is a long-time security professional and entrepreneur. Over the past 25 years he has divided his time between performing security research and consulting/delivering training, both in general IT and cybersecurity. In addition, he has become a best-selling author with many years' experience in both digital and print media. Sean has published several books over the last decade and has expanded his reach even further by appearing on shows on both TV and radio. To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cybersecurity topics and technologies. When in front of the camera Sean has been noted for his casual demeanor and praised for his ability to explain complex topics in an easy-to-understand manner. Outside his own business activities, he is a Chief Warrant Officer and commands a unit specializing in cybersecurity, training, development, and strategy. Additionally, as a CWO he is recognized as an SME in his field and is frequently called upon to provide expertise, training and mentoring wherever and whenever needed. When not working, Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race, and a Spartan Trifecta. He also enjoys traveling, bodybuilding, MMA, Metroid, and The Legend of Zelda.

Who this course is for:
  • IT Professionals, Pentesters and Security Analysts who have a basic knowledge of Kali Linux and want to utilize advanced penetration testing techniques as well as maximize their network testing using advanced Kali Linux features.
Course content
Expand all 107 lectures 13:57:22
+ Kali Linux Penetration Testing Recipes
34 lectures 04:17:33

This video will give you an overview about the course.

Preview 07:32

So we don’t have a spare computer laying around to install this amazing OS on, not a problem. We are going to be looking into installing a VirtualBox to help us setup a virtual desktop on our computer.

  • Install VirtualBox

  • Create a new virtual computer

Installing VirtualBox
06:27

We will now download Kali Linux and install that OS on our virtual machine we had setup. Once we have Kali installed on our virtual computer, we will take a look at it and get ourselves accustomed to this operating system.

  • Download and Install Kali Linux

  • Play around with Kali Linux

Installing Kali Linux
12:41

In this video, you will learn about the Penetration testing and will show you how to get started using Kali Linux.

  • Update the Kali

  • Explore the terminal

  • View the browser and looking at the menu

Getting Used to Kali
06:34

While we are performing our password attacks, we are going to be needing a password text file. Instead of utilizing the default password text file during our testing, we will create our own dictionary of passwords we can use.

  • Create a password dictionary

Password Dictionaries
06:32

Does your target run WordPress? If so we can easily take advantage of different.

  • Exploit Usernames associated with our target

  • Crack passwords of the usernames we extracted from our target

  • Log into the WordPress website using the correct credentials we collected

WordPress Vulnerability Testing
14:25

So we have been challenged with a web-based application and need to test it for vulnerabilities. Not a problem. This section we will learn how to exploit that web app using Burp Suite.

  • Web-Based application testing with Burp Suite

Burp Suite – Web Application Security Testing
07:56

With that web-based application, we will discover how to scan that web app to see if there are any penetration marks that we can use to work our way into any possible back-doors, and other information that we can use to attack our target.

  • Pen Testing with XSSER to find vulnerabilities

Web Application Penetration Testing
03:42

While scanning the website is one task that everyone usually tends to go for, I personally will be showing you my favourite task, viewing the websites source code. We can either download the website directly to our computer, or external storage device, or view it live.

  • View the source code offline

  • View the source code live

Analysing the Source Code
07:07

Throwing testing packages and viewing the source code is a great place to start, we will need to check to see if that web-based application has any open and weak ports that we can use.

  • Utilize Wireshark to help us with port snooping

Wireshark – Port Scanning
05:42

While extracting all of this useful information is a great practice, we will need to learn more about who we are dealing with. This can be for a personal reason, or maybe we have been asked to learn all we can about the website owner.

  • Use an online service, MXToolBox to help us extract information from our target

Domain Name Information and More
07:24

One of the easiest methods to do is test our targeted server for any SQL Injection vulnerabilities. This will allow us to throw SQL Injections to the server for a variety of things.

  • Test server with SQLMap for vulnerabilities

  • Search vulnerabilities using SQLNinja

Testing SQL Injections
12:32

Sometimes our servers are vulnerable to JSP Shell attacks, and if our targeted server is indeed vulnerable to JSP Shell, we should test and document it for future reference.

  • Utilize JBoss-AutoPWN to test for vulnerabilities

Deploying JSP Shell Attacks
03:24

Assuming that our target has open ports for SSH, FTP, or other types of remote connection, we can attempt to brute force our way past the login credentials to gain access to the server.

  • Brute forcing passwords using Cain and Abel

  • Test Passwords with John the Ripper

Password Testing
06:11

In this video, you will learn how to use the PunkSPIDER.

  • Find security measures and weaknesses

  • Highlight every single option available in PunkSPIDER

Security Scanning
02:55

This is extremely important as there are numerous programs that are target could be running. If there is an outdated software, we can view the reports on that specific version to see if there are any vulnerabilities.

  • Scan for outdated software using Nikto

Searching for Outdated Software
04:06

This is an attack in which a host with no authority is directing a domain name server and all of the requests. This allows a hacker to redirect all of the DNS requests, thus the traffic as well, to another machine.

  • Manipulate DNS Traffic By using Ettercap

DNS Spoofing
07:43

Reconnaissance is a crucial part of our ethical hacking pen testing. Recon is the process of gathering all of the required information needed in order to determine the best strategy for hacking our target.

  • Perform a Recon using Sparta

Reconnaissance
05:42

Utilizing a Social Engineering Toolkit (SET), we can create a false login page and have the credentials stored onto our designated location. This allows us to steal login details of users.

  • Create a login page using SET

  • Deploy Virtual Server

  • Send Login page to victim

False Logins
07:31

One of the hardest methods of SEA is gaining access to the physical location. Sometimes our clients will ask us to gain physical access to a section of a building. This can be accomplished, if you have proper people skills and can read people.

  • Learn to read people

  • Figure the best method to talk to someone

  • Gain access to the building

Physical Location
07:39

We have seen on countless hacking movies that the hacker will call the target to extract some type of information. And still to this day, that method is frequently used. We will talk about how to carry out this SEA.

  • Discover which person and sector to talk to

Calling
07:02

While many people don’t realize this, but email is one of the greatest methods of extracting information about a company. An email contains the IP Address and the MX directory of the companies email provider. Plus we can use this method to service our SET section.

  • View IP Address from email

Emailing
06:34

In this video, you will learn about the Harvester: Social Gathering.

  • Find the target

  • Exploit the target by means of emails

  • Extract the data directly from Kali Linux

Social Gathering
05:36

If you are inside of a company, chances are they have their own hidden wireless network. If they do, that is our golden ticket! We will learn how to view those hidden networks, and then crack their passwords.

  • Search for those hidden SSID’s using ArioDump

Viewing Hidden SSID’s
07:53

So we have a SSID we can connect too, now what? This section we will learn how to hack those wireless passwords using a few different techniques. We will be using our created PWD List for this.

  • Explore the password hacking

  • Look into the brute forcing application Air-crack

  • Use ‘pwd.txt’ dictionary

Wireless Password Cracking- Part One
06:53

In this video, you will learn about the John the ripper

  • Explore alternate way of brute forcing

  • Pass through dictionaries

Wireless Password Cracking- Part Two
10:17

While connected to our network, we need to do something instead of Google or Facebook. We are going to learn how to intercept incoming and outgoing traffic on our connected network.

  • Use Wireshark to intercept and read incoming/outgoing traffic

Intercepting Connections
05:16

We have a domain name to test, not an IP. How can we extract the IP information? We will be utilizing the PING command in order to pull that information. Then we will perform an NS Look Up test to find out more information.

  • Ping domain name to get IP Address of target

  • Utilize NS Lookup to extract information about our target

IP Address Search
04:49

This is a two part section. We will first dive into the IP WhoIS report, and then follow up with the domain name WhoIs. This is helpful to see if the domain admin is the same as the server admin, and we can extract other forms of information using these techniques.

  • Search IP Address WhoIS

  • Search Domain Name WhoIS

WhoIS and Domain Name WhoIS
10:10

Often overlooked, but we will be looking at the websites background. Much like your background report, we will need to see what all the creators have done to the website, and when they did it.

  • Perform a background history report using Netcraft

Site Background
10:02

Another overlooked aspect, is searching for email accounts and social media accounts. This will be helpful as we can get an insight to who works there, and helps us with our SEA.

  • Learn how to use the Harvester

Finding Emails and Social Media Accounts
06:51

While performing a Recon, typically our motions are visible to the website, or servers, admins. In this section, we will learn how to perform a stealthy approach by using a protected network.

  • Protect network using VPN

  • Perform a Stealth Recon using Nmap

Stealth Reconnaissance on Protected Network
07:07

Much like we showed on our wireless intercepting, we will be looking at incoming and outgoing connections for the targeted website.

  • Learn how to intercept website traffic using Wireshark

Intercepting Connections
05:48

Now that we have performed our hacks and attacks, we need to generate a report to present to our employer. This should give them some details about your exploits, how you did them, and options on how to fix them.

  • Design the report and adding proper content

Building Our Report
19:30
Test your knowledge
5 questions
+ End-to-End Penetration Testing with Kali Linux
58 lectures 07:51:24

This video provides an overview of the entire course.

Preview 02:10

Info about the course.

   •  Explain course topics

   •  Various components

   •  Learn how to get the most out of this course

How to Get the Most Out of This Course?
02:15

Example of pentesting.

   •  Defender info

   •  Bypass Defender

   •  Exploit Windows10

Teaser: Hack Updated Windows10 Using Kali Linux
11:23

Terms in ethical hacking.

   •  Basic terminologies

   •  Explanation

   •  Kali Linux working

Kali Linux Basics
06:58

In this video, we will learn the installation process of VMware

   •  Explore VMware

   •  Download VMware

   •  Installation of VMware

Download and Install VMware Workstation
05:36

This video will help you download Windows10 and Kali.

   •  Explore Kali Linux

   •  Download Windows10

   •  Download Kali Linux

Download Windows and Kali Linux
08:40

In this video, you will take a look at the Installation of operating systems.

   •  Explore the installation process

   •  Learn about Windows Installation

   •  Installation of Kali Linux

Installation of Windows and Kali Linux
05:49

This video will help you update and upgrade the Kali Linux OS.

   •  Explore the Kali Linux Updating Process

   •  Update the Kali Linux OS

   •  Upgrade The Kali Linux OS

Update the Kali Linux Operating System
05:45

In this video, we will take a look at file commands.

   •  Explore file commands

   •  Learn the meaning of file commands

   •  Understand the practical use of file commands

File Commands
08:16

This video will help you explore directory commands.

   •  Learn about directory commands

   •  Learn the meaning of file commands

   •  Understand practical use of directory commands

Directory Commands
09:16

In this video, we will explore Chain commands.

   •  Explore the basics of chain commands

   •  Learn the meaning of file commands

   •  Understand practical use of chain commands

Chain Commands
11:09

This video explores Kali Linux services.

   •  Explore various services

   •  Learn the meaning of the services

   •  Understand practical use of these services

Manage Services
06:09

In this video, you will explore network IP scanning.

   •  Find IP address in the network

   •  Find the Mac address

   •  Find IP address using ranges

Using the NetDiscover Tool
10:05

This video will help you learn about port scanner.

   •  Find if the target is up or not

   •  Find open ports of target

   •  Find target operating system

Using the Nmap Tool
10:08

In this video, you will explore port scanner.

   •  Find target open port numbers

   •  Find services running in target

   •  Explanation of services

Using the Sparta Tool
07:04

This video will help you learn about information gathering.

   •  Setup Maltego

   •  Gather information about person

   •  Gather information about organization

Using the Maltego Tool
10:56

In this video, you will explore information gathering about a website.

   •  About the Recon-NG tool

   •  Various commands

   •  Explanation of commands to find information about websites

Using the Recon-NG Tool
08:15

This video will help you learn about scanning using Burp Suite tool.

   •  Vulnerability scanning using Burp Suite

   •  Perform Brute Force attack

   •  Get admin access

Using the Burp Suite Tool
14:51

In this video, you will learn about scanning using ZAP Tool.

   •  Web scanning using ZAP tool

   •  Perform spidering

   •  Find vulnerabilities

Using the ZAP Tool
09:33

This video will help you scan using WordPress tool.

   •  About WordPress website

   •  WPScan commands

   •  Get login credentials of WordPress

WordPress Scanning Using WPScan
16:04

This video explores the Installation of Nessus.

   •  About Nessus tool

   •  Download Nessus tool

   •  Installation of Nessus

Nessus Installation
07:36

In this video, you will learn about network vulnerability scanning Nessus.

   •  About Nessus GUI

   •  Set up a scan

   •  Scan entire network using Nessus

Vulnerability Analysis Using Nessus
10:33

This video will explore web analysis using HTTrack tool.

   •  About HTTrack tool

   •  Download web in offline folder

   •  Analyze web files

Analyze the Web Using HTTrack
08:32

This video will help you learn about SQL database.

   •  About SQLite tool

   •  Create databases, tables, and columns

   •  Extract information from database

Using the SQLite Tool
11:21

In this video, explore database hacking using Sqlmap tool.

   •  About Sqlmap tool

   •  Various Sqlmap commands

   •  Extract data using Sqlmap

Using the Sqlmap Tool
12:20

This video will help you explore database hacking using JSQL tool.

   •  About JSQL tool

   •  Various JSQL tool

   •  Extract data using JSQL

Using the JSQL Tool
08:31

This video will help you learn about database hacking using SQLsus tool.

   •  About SQLsus tool

   •  Various SQLsus tool

   •  Extract data using SQLsus

Using SQLsus
09:05

In this video, you will create password lists.

   •  About crunch commands

   •  Various crunch commands

   •  Create dictionary

Using Crunch Commands
06:59

In this video, you will crack passwords.

   •  About John the Ripper tool

   •  About Kali Linux shadow files

   •  Crack Kali Linux passwords using John

Using John the Ripper Tool
06:07

This video will help you setup File Transfer Protocol.

   •  About FTP

   •  Download FileZilla server

   •  Installation of FileZilla server

FTP Setup
09:21

In this video, you will learn about password cracking using Hydra tool.

   •  About Hydra tool

   •  Hydra commands

   •  Crack FTP using Hydra tool

Using Hydra
11:07

In this video, you will explore password cracking using Medusa tool.

   •  About Medusa tool

   •  Medusa commands

   •  Crack FTP using Medusa

Using Medusa
10:28

This video will explore password cracking using Ncrack tool.

   •  About Ncrack tool

   •  Ncrack commands

   •  Crack FTP using Ncrack

Using Ncrack
04:18

In this video, you will change Mac address of systems.

   •  About Mac address tool

   •  Various Mac changer commands

   •  Change Mac address

Using the MAC Changer Tool
06:46

In this video, you will perform MITM using Wireshark tool.

   •  About Wireshark tool

   •  Packet Sniffing using Wireshark

   •  Packet analysis using Wireshark

Using the Wireshark Tool
09:42

In this video, you will perform MITM using Ettercap tool.

   •  About Ettercap tool

   •  Sniffing using Ettercap

   •  Gather sensitive data using Ettercap

Using the Ettercap Tool
07:37

This video will help you perform MITMProxy and Driftnet tools.

   •  About MITMProxy and Driftnet tools

   •  Perform MITM

   •  Gather sensitive information

Using MITMProxy and Driftnet Tool
05:05

In this video, you will perform a phishing attack.

   •  About SET tool

   •  Create Phishing pages

   •  Perform Phishing attack

Phishing Attack Using SET
09:29

This video will help you perform a Trojan attack.

   •  About Trojan creation using SET

   •  Create a Trojan

   •  Trojan attack on victim machine

Trojan Attack Using SET
11:05

In this video, you will perform social engineering attacks using the Maltego tool.

   •  About Maltego tool

   •  Gather information about systems

   •  Perform social engineering attack

Using the Maltego Tool
08:47

In this video, you will perform social engineering attack using BEEF.

   •  About BEEF tool

   •  Send a malicious link to target systems

   •  Connect victim’s browser with attacker machine

Using Browser Exploitation Framework
09:46

This video explores wireless adapter information.

   •  About wireless adapter

   •  Use of wireless adapter

   •  Explanation about various wireless adapters

About Wireless Adapter
04:07

In this video, you will explore the process to Start Monitor Mode.

   •  About monitor mode

   •  Connect wireless adapter

   •  Start monitor mode

Start Monitor Mode
05:28

This video will help you perform WEP attack using Fern WIFI cracker.

   •  About WEP

   •  About Fern Wifi cracker

   •  Process to crack WEP

Hack WEP Using the Fern Tool
07:56

In this video, you will create dictionary.

   •  Using crunch

   •  Various crunch commands

   •  Create dictionary

Create a Dictionary
06:28

In this video, you will perform WPA attack using Fern WIFI cracker.

   •  About WPA

   •  Use of Fern Wifi cracker

   •  Process to crack WPA

Hack WPA/WPA2/WPA2-PSK
07:20

This video will explore Metasploit Introduction.

   •  About Metasploit

   •  Commands of Metasploit

   •  Exploits of Metasploit

Metasploit Basics
05:30

In this video, you will explore the installation of various Antivirus Bypass Frameworks.

   •  About Various AV Bypass Frameworks

   •  Download AV Bypass Frameworks

   •  Installation of AV Bypass Frameworks

AV Bypass Frameworks
08:54

This video will help you learn about the process to bypass Windows Defender of Windows10.

   •  About Windows the Defender bypass framework

   •  Create a payload using the Zirikatu framework

   •  Perform Windows10 penetration

Bypass Target Defender
11:26

In this video, you will learn about the process to bypass Antivirus of Windows10.

   •  About Antivirus Bypass Framework

   •  Create a payload using Fatrat Framework

   •  Perform Windows10 Penetration

Bypass Target Antivirus
11:06

In this video, you will learn about post-exploitation

   •  About Meterpreter

   •  Various Meterpreter commands

   •  Perform post- exploitation

Meterpreter Commands
09:28

This video will help you insert keylogger into the victim machine.

   •  About keylogger

   •  Command to insert keylogger

   •  Get information from victim machine

Insert Keylogger
05:36

In this video, you will perform privilege escalation.

   •  About privilege escalation

   •  Get root access in victim machine

   •  Various privilege escalation commands

Privilege Escalation
08:20

In this video, you will explore steal login credentials of victim machine

   •  About victim machine login credentials

   •  Find exploits in Metasploit

   •  Gather login credentials using Metasploit

Stealing Login Credentials
07:06

In this video, you will learn about reporting using Leafpad tool.

   •  About Leafpad tool

   •  Various uses of Leafpad

   •  Explanation of Leafpad use

Using Leafpad
02:50

This video will help you explore reporting using the CutyCapt tool.

   •  About CutyCapt tool

   •  Use of CutyCapt

   •  Take captures of web pages

Using CutyCapt
05:31

In this video, you will learn about reporting using Faraday IDE tool.

   •  About Faraday IDE tool

   •  Use of Faraday IDE

   •  Explanation of Faraday IDE

Using Faraday IDE
04:07

In this video, you will learn about reporting using the recordMyDesktop tool.

   •  About recordMyDesktop tool

   •  Use of recordMyDesktop

   •  Record the screen of Kali Linux O.Sd

Using recordMyDesktop
05:14
Test your knowledge
5 questions
+ Gaining Access and Covering Your Tracks with Kali Linux
15 lectures 01:48:25

This video provides an overview of the entire course.

Preview 03:31

In this video, we'll learn how to use Netcat.

  • Understand the basic purpose of Netcat

  • See a hands-on demo on getting remote access

Using Netcat
06:58

In this video, we'll learn finding an opening and target.

  • Have a quick overview of Netcat

  • Get a hands-on demo on creating a connection

Finding an Opening
10:59

In this video, we'll learn transferring files with Netcat.

  • Understand transferring of files

  • Get a hands-on demo on the process of information transfer

Transferring Files
10:57

In this video, we'll learn executing commands with Netcat.

  • Understand the execution of files

  • Get a hands-on demo on executing commands

Executing Commands with Netcat
13:02

In this video, we'll learn about tunneling.

  • Understand tunneling

  • Learn the characteristics of HTTP Tunnel

What Is an HTTP Tunnel?
04:12

In this video, we'll look at finding an opening to use with HTTP tunnel.

  • Get a hands-on demo on HTTP tunnel

Finding an Opening
04:42

In this video, we'll look into using HTTP tunnel to transfer data to a remote host.

  • Get a hands-on demo on transferring data

Using an HTTP Tunnel
05:41

In this video, we'll discuss executing commands with HTTP Tunnel.

  • Get a hands-on demo on executing commands using HTTP tunnel

Executing Commands with HTTP Tunnel
04:48

In this video, we'll look at what using a brute-force attack means.

  • Understand what a password crack is

  • Learn different types of password cracking

  • Learn what a brute-force attack is and forms of it

Using a Brute-Force Attack
07:58

In this video, we'll look into creation of a Rainbow table.

  • Understand the purpose of Rainbow table creation

  • Get a hands-on demo on creating a Rainbow table

Creating Rainbow Tables
10:06

In this video, we'll look at using a Rainbow table.

  • Understand using a Rainbow table

  • Get a hands-on demo using a Rainbow table

Using Rainbow Tables
08:52

Learn what can be captured in a log file.

  • Understand the purpose of log files

  • Understand the events present in log files

  • Learn the locations and formats of log files

What Can Be Captured in a Log File?
06:52

In this video, we'll learn where log files are stored.

  • Learn why we should remove log files

  • Understand the removal techniques

Where Are Log Files Stored?
05:08

In this video, we'll look into the motivations for removal of log file.

  • Learn where the log files are located

  • Understand the potential locations

Motivations for Removal
04:39