Kali Linux - Backtrack Evolved
4.3 (35 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
744 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kali Linux - Backtrack Evolved to your Wishlist.

Add to Wishlist

Kali Linux - Backtrack Evolved

Assuring Security by Penetration Testing
4.3 (35 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
744 students enrolled
Created by Packt Publishing
Last updated 9/2014
Curiosity Sale
Current price: $10 Original price: $85 Discount: 88% off
30-Day Money-Back Guarantee
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Many advanced techniques are addressed within this series, but it is still designed to simultaneously accommodate less experienced viewers. The series provides detailed explanations intended to clearly address the underlying processes involved with all tasks performed.
View Curriculum
  • Basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.

Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.

Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.

It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.

About the Author

Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force where he worked as an intrusion detection specialist, network vulnerability analyst and malware forensic investigator for a large enterprise network with over 55,000 networked systems. He currently holds a Bachelor’s degree in Information Technology and multiple professional information security certifications, to include CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), eWPT (eLearnSecurity Web-Application Penetration Tester), GCIH (GIAC Certified Incident Handler), CNDA (Certified Network Defense Architect), CEH (Certified Ethical Hacker), ECSA (EC-Council Certified Security Analyst) and CHFI (Computer Hacking Forensic Investigator).

Who is the target audience?
  • Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
40 Lectures
Lab Preparation
5 Lectures 16:08

Must have multiple virtual machines for a test lab / acquire images from multiple locations

Developing a Network Environment

Must manage network operating systems in a singe virtual environment / install the VirtualBox virtualization software

How to Install Oracle VirtualBox

Must manage the network operating systems in a singe virtual environment / install the VMware virtualization software

How to Install VMware Player

Need a Kali Linux virtual machine for performing penetration tests / install Backtrack 5

How to Install Kali Linux

Must have vulnerable systems to perform penetration testing techniques / modify security policies on network systems to increase vulnerabilities

Increasing Network Attack Surface
Information Gathering and Reconnaissance
5 Lectures 18:59

Information gathering / use public resources and websites

Passive Reconnaissance

Information gathering / use uniquely crafted Google queries

Google Hacking

Use a series of Google queries to enumerate target subdomains

Subdomain Enumeration with Google Hacking

Information gathering / automated command-line tools (Dmitry & Goofile)

Reconnaissance Tools (Dmitry & Goofile)

Information gathering / an all-in-one translation tool (Maltego)

Preview 03:31
Target Discovery
5 Lectures 21:05

Network discovery / discover hosts on the local network at layer 2

Layer 2 Discovery

Network discovery / discover remote hosts at layer 3

Layer 3 Discovery

Network discovery / use nmap utilities

Host Discovery with nmap

Custom discovery scans / Scapy for scan scripting

Preview 04:30

Operating system identification / automated tools (p0f, xprobe2, and nmap)

Fingerprinting Operating Systems
Scanning and Enumeration
5 Lectures 20:24

Port enumeration / the nmap command-line tool

Scanning with nmap

Port enumeration / Zenmap graphical interface

Scanning with Zenmap

Automate nmap related tasks / use Nmap Scripting Engine and scriptable outputs

Nmap Scripting

Stealth scanning without risk of detection / zombie scanning with an idle host

Zombie Scanning

Verify services running on open ports / Netcat, Dmitry, and Amap

Service Identification
Vulnerability Mapping
5 Lectures 19:31

Identify unique vulnerabilities / use Metasploit auxiliary modules

Metasploit Auxilliary Scans

Identify vulnerabilities / install Nessus vulnerability scanner

Installing Nessus

Identify vulnerabilities / perform scans with Nessus

Nessus Scanning

Focus on vulnerability discovery / modify and create scan policies

Nessus Policies

Gather vulnerability information / review Nessus scan results

Nessus Result Analysis
Exploitation with Metasploit
5 Lectures 19:46

Automated tool to launch exploits against remote systems / use the Metasploit framework

Metasploit Framework

Launch exploit with Meterpreter payload / navigate payload to further compromise the system

Meterpreter Basics

Launch exploit with Meterpreter payload / perform advanced exploitation techniques

Meterpreter - Advanced Exploitation

Automated exploitation platform / install Metasploit Pro in Kali Linux

Installing Metasploit Pro

Automated exploitation platform / use Metasploit Pro to perform discovery, vulnerability mapping, and exploitation

Preview 04:55
Hands-on Exploitation
5 Lectures 27:28

Exploit target systems / use proof-of-concept scripts in the exploit database

Preview 05:29

Social engineering attack / use credential harvester to gather the victim's credentials

Social Engineering Toolkit - Credential Harvester

Exploit web services / Burp Suite Intruder function

Burp Suite Intruder

Learn web application attacks / use DVWA for testing

Web Application Exploitation

Maintain access to the exploited system / use Netcat and Meterpreter backdoors

Preview 05:25
Privilege Escalation
5 Lectures 20:09

Man-in-the-middle attack / use the ettercap graphic interface


Unknown hash value / use Hash-ID to identify and then Find-My-Hash to crack a password hash

Hash Identifier / Find-My-Hash

Acquire network service credentials / use Hydra to attack a service


Acquire Linux and/or Windows password hashes / use John the Ripper to crack

John the Ripper

Graphical interface for password attacks / use Johnny or xHydra

Johnny / xHydra
About the Instructor
Packt Publishing
3.9 Average rating
7,297 Reviews
52,233 Students
616 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.