Finding Low Hanging Fruit with Kali
Offered By: YouTube
Course Description
Overview
Explore the world of penetration testing and cybersecurity with this conference talk from BSides Nashville 2015. Learn about Kali Linux, a powerful open-source platform for security auditing and penetration testing. Discover how to set up and use Kali, configure Metasploit, and identify common vulnerabilities in systems. Gain insights into finding "low hanging fruit" in cybersecurity, including unnecessary services, weak passwords, exploitable vulnerabilities, and web-based admin interfaces. Perfect for both beginners and experienced professionals looking to enhance their security assessment skills.
Syllabus
Intro
Who Am I?
What is Kali?
How to Get Kali
Setup Kali
Setup Metasploit
A Quick Look at Kali
Low Hanging Fruit
Unnecessary Services
Weak Passwords
Exploitable Vulnerabilities
Web-Based Admin Interfaces
Find out More
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network