Kali Linux - Backtrack Evolved

Assuring Security by Penetration Testing
4.2 (23 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
678 students enrolled
$85
Take This Course
  • Lectures 40
  • Contents Video: 2.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 9/2014 English

Course Description

Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.

Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.

It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.

About the Author

Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force where he worked as an intrusion detection specialist, network vulnerability analyst and malware forensic investigator for a large enterprise network with over 55,000 networked systems. He currently holds a Bachelor’s degree in Information Technology and multiple professional information security certifications, to include CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), eWPT (eLearnSecurity Web-Application Penetration Tester), GCIH (GIAC Certified Incident Handler), CNDA (Certified Network Defense Architect), CEH (Certified Ethical Hacker), ECSA (EC-Council Certified Security Analyst) and CHFI (Computer Hacking Forensic Investigator).

What are the requirements?

  • Basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.

What am I going to get from this course?

  • Many advanced techniques are addressed within this series, but it is still designed to simultaneously accommodate less experienced viewers. The series provides detailed explanations intended to clearly address the underlying processes involved with all tasks performed.

What is the target audience?

  • Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Lab Preparation
02:17

Must have multiple virtual machines for a test lab / acquire images from multiple locations

03:02

Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software

03:06

Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software

03:52

Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5

03:51

Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities

Section 2: Information Gathering and Reconnaissance
04:11

Information gathering / use public resources and websites

04:25

Information gathering / use uniquely crafted Google queries

03:40

Use a series of Google queries to enumerate target subdomains

03:12

Information gathering / automated command-line tools (Dmitry & Goofile)

03:31

Information gathering / an all-in-one translation tool (Maltego)

Section 3: Target Discovery
03:42

Network discovery / discover hosts on the local network at layer 2

05:22

Network discovery / discover remote hosts at layer 3

04:36

Network discovery / use nmap utilities

04:30

Custom discovery scans / Scapy for scan scripting

02:55

Operating system identification / automated tools (p0f, xprobe2, and nmap)

Section 4: Scanning and Enumeration
03:22

Port enumeration / the nmap command-line tool

04:32

Port enumeration / Zenmap graphical interface

04:53

Automate nmap related tasks / use Nmap Scripting Engine and scriptable outputs

03:35

Stealth scanning without risk of detection / zombie scanning with an idle host

04:02

Verify services running on open ports / Netcat, Dmitry, and Amap

Section 5: Vulnerability Mapping
03:13

Identify unique vulnerabilities / use Metasploit auxiliary modules

04:40

Identify vulnerabilities / install Nessus vulnerability scanner

04:03

Identify vulnerabilities / perform scans with Nessus

03:40

Focus on vulnerability discovery / modify and create scan policies

03:55

Gather vulnerability information / review Nessus scan results

Section 6: Exploitation with Metasploit
04:45

Automated tool to launch exploits against remote systems / use the Metasploit framework

04:14

Launch exploit with Meterpreter payload / navigate payload to further compromise the system

03:45

Launch exploit with Meterpreter payload / perform advanced exploitation techniques

02:07

Automated exploitation platform / install Metasploit Pro in Kali Linux

04:55

Automated exploitation platform / use Metasploit Pro to perform discovery, vulnerability mapping, and exploitation

Section 7: Hands-on Exploitation
05:29

Exploit target systems / use proof-of-concept scripts in the exploit database

05:11

Social engineering attack / use credential harvester to gather the victim's credentials

05:22

Exploit web services / Burp Suite Intruder function

06:01

Learn web application attacks / use DVWA for testing

05:25

Maintain access to the exploited system / use Netcat and Meterpreter backdoors

Section 8: Privilege Escalation
04:11

Man-in-the-middle attack / use the ettercap graphic interface

03:39

Unknown hash value / use Hash-ID to identify and then Find-My-Hash to crack a password hash

03:58

Acquire network service credentials / use Hydra to attack a service

04:11

Acquire Linux and/or Windows password hashes / use John the Ripper to crack

04:10

Graphical interface for password attacks / use Johnny or xHydra

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Packt Publishing, Tech Knowledge in Motion

Over the past ten years Packt Publishing has developed an extensive catalogue of over 2000 books, e-books and video courses aimed at keeping IT professionals ahead of the technology curve. From new takes on established technologies through to the latest guides on emerging platforms, topics and trends – Packt's focus has always been on giving our customers the working knowledge they need to get the job done. Our Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.

Ready to start learning?
Take This Course