Kali Linux for Advanced Pen Testing and Ethical Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Syllabus
Introduction
- Using Kali Linux as the basis for advanced penetration testing
- What you should know
- Disclaimer
- Testing with Kali Linux
- Understanding Kali deployments
- Preparing your toolbox
- Preparing to use exploits for testing
- Managing the Kali menu
- Using the LinkedIn Learning penetration testing lab
- Introduction to shells
- Exploring Kali webshells
- Weeving a shell
- Generating shellcode with msfvenom
- Injecting images with jhead
- Using shellcode in exploits
- Exploiting systems with Kali
- Exploiting with Python
- Exploiting with Perl
- Exploiting with C
- Exploiting with CPP
- Obtaining Windows passwords
- Obtaining Linux passwords
- Targeting Metasploitable
- Exploiting VSFTPD
- Exploiting with ProFTPD
- Exploiting Tomcat
- Exploiting IRC
- Exploiting the distributed compile system
- Exploiting network files
- Hiding in plain sight
- Escalating to root
- Starting with online labs
- Exploiting rejetto
- Exploiting the Devel
- Time to exploit Cronos
- Cronos revisited: Getting to the root
- Using a nightmare escalator
- Next steps
Taught by
Malcolm Shore
Related Courses
CNIT 127: Exploit DevelopmentCNIT - City College of San Francisco via Independent Enterprise Security Fundamentals
Microsoft via edX Penetration Testing - Post Exploitation
New York University (NYU) via edX Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy Hands-on Penetration Testing Labs 4.0
Udemy