O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Path: Kali Linux

Video Description

An introduction to white hat penetration testing

In Detail

The phrase ‘the best offense is a good defense’ couldn’t be more applicable to the realm of enterprise penetration testing and security. This Learning Path specifically focuses on the broader Kali Linux toolkit, and will provide you with the expertise and exposure you need to fully test and explore your local networks with confidence. Please test responsibly.

Prerequisites: Strong proficiency with at least one other programming language

Resources: Code downloads and errata:

  • Kali Linux Web App Testing

  • PATH PRODUCTS

    This path navigates across the following products (in sequential order):

  • Kali Linux Backtrack Evolved: Assuring Security by Penetration Testing (2h 44m)

  • Penetration Testing for Highly-Secured Environments (2h 50m)

  • Kali Linux Web App Testing (3h 50m)

  • Photo Credit: ©iStockphoto.com/D3Damon

    Table of Contents

    1. Chapter 1: Kali Linux Backtrack Evolved: Assuring Security by Penetration Testing
      1. Developing a Network Environment 00:02:17
      2. How to Install Oracle VirtualBox 00:03:02
      3. How to Install VMware Player 00:03:07
      4. How to Install Kali Linux 00:03:52
      5. Increasing Network Attack Surface 00:03:51
      6. Passive Reconnaissance 00:04:11
      7. Google Hacking 00:04:26
      8. Subdomain Enumeration with Google Hacking 00:03:40
      9. Reconnaissance Tools (Dmitry & Goofile) 00:03:12
      10. Network Enumeration with Maltego 00:03:31
      11. Layer 2 Discovery 00:03:43
      12. Layer 3 Discovery 00:05:22
      13. Host Discovery with nmap 00:04:37
      14. Network Discovery with Scapy 00:04:30
      15. Fingerprinting Operating Systems 00:02:55
      16. Scanning with nmap 00:03:23
      17. Scanning with Zenmap 00:04:33
      18. Nmap Scripting 00:04:53
      19. Zombie Scanning 00:03:36
      20. Service Identification 00:04:02
      21. Metasploit Auxilliary Scans 00:03:13
      22. Installing Nessus 00:04:40
      23. Nessus Scanning 00:04:04
      24. Nessus Policies 00:03:40
      25. Nessus Result Analysis 00:03:55
      26. Metasploit Framework 00:04:45
      27. Meterpreter Basics 00:04:15
      28. Meterpreter - Advanced Exploitation 00:03:45
      29. Installing Metasploit Pro 00:02:08
      30. Exploitation with Metasploit Pro 00:04:56
      31. Exploit Database 00:05:30
      32. Social Engineering Toolkit - Credential Harvester 00:05:11
      33. Burp Suite Intruder 00:05:22
      34. Web Application Exploitation 00:06:02
      35. Maintaining Access 00:05:26
      36. Ettercap 00:04:11
      37. Hash Identifier / Find-My-Hash 00:03:39
      38. Hydra 00:03:58
      39. John the Ripper 00:04:11
      40. Johnny / xHydra 00:04:11
    2. Chapter 2: Penetration Testing for Highly-Secured Environments
      1. What Is Advanced Penetration Testing? 00:03:36
      2. Installing VirtualBox 00:04:42
      3. Installing BackTrack 5 R3 00:04:25
      4. Installing Metasploitable 00:02:47
      5. Set up BackTrack 5 R3 00:04:13
      6. What Is Footprinting? 00:03:05
      7. Using Nslookup and Dig 00:04:14
      8. Using Tracert and Traceroute 00:04:35
      9. Using Paterva Maltego 00:04:47
      10. Google Dorks and Social Engineering 00:05:16
      11. What Is Enumeration? 00:02:33
      12. Using Nmap and Zenmap 00:06:08
      13. Using SNMPenu and SNMPwalk 00:04:52
      14. Banner Grabbing with Netcat 00:03:37
      15. Searching for Exploits 00:03:30
      16. What Is Exploitation? 00:04:18
      17. Installing the Nessus Vulnerability Scanner 00:04:22
      18. Using the Nessus Vulnerability Scanner-Part 1 00:04:52
      19. Installing and Updating the Metasploit Framework 00:02:58
      20. Using the Metasploit Framework 00:07:32
      21. How Do Hackers Break into a Local System? 00:03:27
      22. Breaking into Windows 7-Part 1 00:02:48
      23. Breaking into Windows 7-Part 2 00:03:00
      24. Breaking into Windows 7-Part 3 00:04:31
      25. Breaking into Windows 7-Part 4 00:02:28
      26. How Do Hackers Break into a Remote System? 00:05:28
      27. Using the Social Engineering Toolkit 00:04:01
      28. Using the Nessus Vulnerability Scanner-Part 2 00:05:15
      29. Exploiting Windows 7 00:05:04
      30. Exploiting Metasploitable 00:05:42
      31. Evading Web Filters, Firewalls, and IDSes 00:05:38
      32. Bypassing Web Filters-Part 1 00:05:22
      33. Bypassing Web Filters-Part 2 00:03:40
      34. Stealth Scanning-Part 1 00:02:32
      35. Stealth Scanning-Part 2 00:04:50
      36. Why Is It So Important to Write a Report? 00:04:29
      37. What Should Be In the Report? 00:03:55
      38. Writing a Report 00:04:43
      39. Turning In the Report 00:03:14
      40. Final Statement by the Author 00:04:27
    3. Chapter 3 : Kali Linux Web App Testing
      1. Course Overview 00:04:15
      2. Taking the First Steps 00:08:50
      3. Using Kali Linux 00:05:21
      4. Basic SQL Injection 00:07:55
      5. sqlmap Part 1 00:07:57
      6. sqlmap Part 2 00:09:10
      7. Types of Cross-site Scripting XSS 00:04:22
      8. Working with XSSER 00:06:50
      9. Filtering and Validation 00:07:51
      10. Local and Remote File Inclusion 00:06:39
      11. Fimap 00:04:17
      12. Directory Traversal 00:04:10
      13. Hash Brute-forcing 00:04:26
      14. Hashcat 00:09:30
      15. Form Brute-forcing 00:07:30
      16. Hydra 00:07:24
      17. Introduction to Vulnerability Scanners 00:08:24
      18. Open Redirects and Open Proxies 00:06:07
      19. Remote Command Execution RCE 00:06:24
      20. Information Disclosure 00:05:26
      21. Tampering Data in Packets 00:04:42
      22. What Is CSRF? 00:04:10
      23. CSRF Tester Tool 00:08:34
      24. Tokens and the Same-origin Policy 00:07:11
      25. OWASP ZAP 00:06:32
      26. Two-factor Authentication 00:03:57
      27. Weak Passwords and Phishing 00:05:47
      28. Clickjacking 00:06:27
      29. Wrapping Up 00:04:43