O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

End-to-End Penetration Testing with Kali Linux

Video Description

This course will help you discover the secrets of Pentesting using Linux

About This Video

  • Perform vulnerability assessment and penetration testing.
  • Perform server-side and client-side attacks.
  • Master major Kali Linux tools and techniques.

In Detail

Kali Linux contains a large number of penetration testing tools from various different niches of the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. This output and information can serve as a precursor to penetration testing efforts. In this course, you will perform tests to carry out and exploit hidden vulnerabilities within your network and systems; you will not only expose these but will also provide ways and methods to fix, secure, and harden your system's security, protecting it against any other attacks.

You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested; and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access on compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pentesting tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment.

By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Welcome
    1. The Course Overview 00:02:11
    2. How to Get the Most Out of This Course? 00:02:16
    3. Teaser: Hack Updated Windows10 Using Kali Linux 00:11:23
    4. Kali Linux Basics 00:06:58
  2. Chapter 2 : Lab Setup
    1. Download and Install VMware Workstation 00:05:37
    2. Download Windows and Kali Linux 00:08:41
    3. Installation of Windows and Kali Linux 00:05:49
    4. Update the Kali Linux Operating System 00:05:45
  3. Chapter 3 : Terminal Commands
    1. File Commands 00:08:17
    2. Directory Commands 00:09:16
    3. Chain Commands 00:11:09
    4. Manage Services 00:06:09
  4. Chapter 4 : Information Gathering
    1. Using the NetDiscover Tool 00:10:05
    2. Using the Nmap Tool 00:10:08
    3. Using the Sparta Tool 00:07:05
    4. Using the Maltego Tool 00:10:57
    5. Using the Recon-NG Tool 00:08:16
  5. Chapter 5 : Vulnerability Analysis
    1. Using the Burp Suite Tool 00:14:51
    2. Using the ZAP Tool 00:09:33
    3. WordPress Scanning Using WPScan 00:16:04
    4. Nessus Installation 00:07:36
    5. Vulnerability Analysis Using Nessus 00:10:33
    6. Analyze the Web Using HTTrack 00:08:32
  6. Chapter 6 : Database Hacking
    1. Using the SQLite Tool 00:11:22
    2. Using the Sqlmap Tool 00:12:21
    3. Using the JSQL Tool 00:08:32
    4. Using SQLsus 00:09:06
  7. Chapter 7 : Password Cracking
    1. Using Crunch Commands 00:06:59
    2. Using John the Ripper Tool 00:06:08
    3. FTP Setup 00:09:21
    4. Using Hydra 00:11:07
    5. Using Medusa 00:10:29
    6. Using Ncrack 00:04:18
  8. Chapter 8 : Man-in-the-Middle Attack/Sniffing
    1. Using the MAC Changer Tool 00:06:46
    2. Using the Wireshark Tool 00:09:42
    3. Using the Ettercap Tool 00:07:38
    4. Using MITMProxy and Driftnet Tool 00:05:06
  9. Chapter 9 : Social Engineering Attack
    1. Phishing Attack Using SET 00:09:30
    2. Trojan Attack Using SET 00:11:05
    3. Using the Maltego Tool 00:08:47
    4. Using Browser Exploitation Framework 00:09:46
  10. Chapter 10 : Wireless Hacking
    1. About Wireless Adapter 00:04:08
    2. Start Monitor Mode 00:05:28
    3. Hack WEP Using the Fern Tool 00:07:56
    4. Create a Dictionary 00:06:28
    5. Hack WPA/WPA2/WPA2-PSK 00:07:20
  11. Chapter 11 : Exploitation Techniques
    1. Metasploit Basics 00:05:31
    2. AV Bypass Frameworks 00:08:55
    3. Bypass Target Defender 00:11:27
    4. Bypass Target Antivirus 00:11:07
  12. Chapter 12 : Post-Exploitation Techniques
    1. Meterpreter Commands 00:09:29
    2. Insert Keylogger 00:05:36
    3. Privilege Escalation 00:08:20
    4. Stealing Login Credentials 00:07:06
  13. Chapter 13 : Reporting
    1. Using Leafpad 00:02:50
    2. Using CutyCapt 00:05:31
    3. Using Faraday IDE 00:04:08
    4. Using recordMyDesktop 00:05:15