O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Windows Penetration Testing Using Kali Linux

Video Description

Dot your i’s and cross your t’s with this pentesting course to safeguard your network and websites with Kali Linux

About This Video

  • Discover the vast features and programs that Kali Linux holds to perform and carry out a variety of penetration testing tasks
  • Use the various features of Kali Linux with this professional guide to make it the pentesting toolkit of your choice
  • Exploit the most common vulnerabilities in the Windows operating system and understand how attackers take advantage of them

In Detail

Kali Linux is the premier platform for testing and maintaining Windows security. This course will help you understand the threats and how to safeguard your network and websites.

In this course, you’ll start by gathering information about the target network and websites to discover all the vulnerable ports. Moving on, you’ll learn to bypass security restrictions using exploitation tools to access the target system. Also, you’ll hack websites using various pentesting tools and learn how to present your test reports.

By the end of the course, you’ll be able to find, exploit, and prevent security vulnerabilities in Windows OS using Kali Linux.

Table of Contents

  1. Chapter 1 : Sharpening the Saw
    1. The Course Overview 00:02:53
    2. Pre-Installed Kali Linux 00:10:50
    3. Installing Kali Linux from Scratch 00:07:20
    4. Updating, Downloading and Installing Apps 00:10:25
    5. Running Services on Kali 00:04:00
  2. Chapter 2 : Gathering Information of Target Network
    1. Understanding Different Types of Tools 00:02:52
    2. Footprinting the Network 00:08:46
    3. Manipulating Google 00:07:44
    4. Scanning with NMAP and Zenmap 00:07:30
    5. Using Maltego 00:10:27
  3. Chapter 3 : Never Be Left Vulnerable
    1. Installing OpenVAS 00:04:13
    2. Scanning with OpenVAS 00:05:14
    3. Installing Nessus 00:08:46
    4. Scanning with Nessus 00:05:08
  4. Chapter 4 : Working with Exploitation Tools
    1. Exploiting with Metasploit 00:04:38
    2. Metasploit and MSFvenom 00:10:34
    3. Using Armitage 00:07:33
    4. Other Ways to Exploit 00:07:42
  5. Chapter 5 : Web Penetration Testing
    1. Understanding Yuki 00:08:10
    2. Scanning with Yuki 00:04:44
    3. Installing, Configuring, and Scanning with Sniper 00:06:08
    4. Using Individual Tools 00:06:33
  6. Chapter 6 : Hack Websites with SQL Injections and XSS
    1. Understanding Cross-Site Scripting 00:03:49
    2. Implementing an XSS Attack 00:07:52
    3. SQL Injection Theory 00:01:59
    4. Implementing a SQL Attack 00:12:31
  7. Chapter 7 : Cracking Passwords
    1. Cracking Passwords with John the Ripper 00:07:06
    2. Cracking Passwords with Hydra 00:05:22
    3. Checking AD Password Strengths of Users 00:10:27
    4. Using Software to Bypass Local Passwords 00:04:41
  8. Chapter 8 : Presenting Your Report
    1. Monitoring Resources 00:05:22
    2. Gathering Your Findings 00:05:36
    3. Report Presentation 00:09:33