Kali Linux for Advanced Pen Testing and Ethical Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Syllabus
Introduction
- Using Kali Linux as the basis for advanced penetration testing
- What you should know
- Disclaimer
- Testing with Kali Linux
- Understanding Kali deployments
- Preparing your toolbox
- Preparing to use exploits for testing
- Managing the Kali menu
- Using the LinkedIn Learning penetration testing lab
- Introduction to shells
- Exploring Kali webshells
- Weeving a shell
- Generating shellcode with msfvenom
- Injecting images with jhead
- Using shellcode in exploits
- Exploiting systems with Kali
- Exploiting with Python
- Exploiting with Perl
- Exploiting with C
- Exploiting with CPP
- Obtaining Windows passwords
- Obtaining Linux passwords
- Targeting Metasploitable
- Exploiting VSFTPD
- Exploiting with ProFTPD
- Exploiting Tomcat
- Exploiting IRC
- Exploiting the distributed compile system
- Exploiting network files
- Hiding in plain sight
- Escalating to root
- Starting with online labs
- Exploiting rejetto
- Exploiting the Devel
- Time to exploit Cronos
- Cronos revisited: Getting to the root
- Using a nightmare escalator
- Next steps
Taught by
Malcolm Shore
Related Courses
CompTIA PenTest+ CertificationA Cloud Guru AWS SimuLearn: Cyber Security Threats
Amazon Web Services via AWS Skill Builder Ethical Hacking
Cabrillo College via California Community Colleges System Network Security
City College of San Francisco via California Community Colleges System Ethical Hacking
Chaffey College via California Community Colleges System