Finding Low Hanging Fruit with Kali
Offered By: YouTube
Course Description
Overview
Explore the world of penetration testing and cybersecurity with this conference talk from BSides Nashville 2015. Learn about Kali Linux, a powerful open-source platform for security auditing and penetration testing. Discover how to set up and use Kali, configure Metasploit, and identify common vulnerabilities in systems. Gain insights into finding "low hanging fruit" in cybersecurity, including unnecessary services, weak passwords, exploitable vulnerabilities, and web-based admin interfaces. Perfect for both beginners and experienced professionals looking to enhance their security assessment skills.
Syllabus
Intro
Who Am I?
What is Kali?
How to Get Kali
Setup Kali
Setup Metasploit
A Quick Look at Kali
Low Hanging Fruit
Unnecessary Services
Weak Passwords
Exploitable Vulnerabilities
Web-Based Admin Interfaces
Find out More
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX