Oreilly - Learning Kali Linux - 9781789134469
Oreilly - Learning Kali Linux
by Rassoul Ghaznavi Zadeh | Publisher: Packt Publishing | Release Date: August 2018 | ISBN: 9781789134469


Learn the secrets of ethical hacking, penetration testing, and network discovery using Kali Linux About This VideoLearn the secrets of ethical hacking, penetration testing, and white hat techniques using Kali Linux.Perform network penetration testing and exploit vulnerable systems.Be confident in using Kali Linux to become a top-notch penetration tester and ethical hacker.In DetailKali Linux offers a large number of penetration testing tools from various different niches in the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) to uncover vulnerabilities and security holes. The output and information can serve as a precursor to penetration testing efforts.The course starts with vulnerability assessment and penetration testing. Then, you will learn about the process of ethical hacking from the initial identification and investigation to the final exploitations and report. Next, we will build a test lab in a virtual environment using Oracle VirtualBox, Kali Linux, and a vulnerable OS. You will get started with reconnaissance to gather information about a target. Next, you will focus on NMAP, which is one of the biggest and most popular networks and host scanning tools. You will also learn to avoid being detected by firewalls and IPs when using NMAP. Vulnerability assessment and analysis are the most important steps before trying to hack and penetrate a system so we will learn to initiate an exploit and penetrate a system. Finally, you'll exploit a system and, once exploitation is confirmed, you'll prepare and present a report to the customer.By the end of the course, you will be an excellent hacker and will have mastered all the hows and whys of ethical hacking.The code bundle for this course is available at https://github.com/PacktPublishing/Learning-Kali-Linux
  1. Chapter 1 : What Is Ethical Hacking?
    • The Course Overview 00:03:29
    • Penetration Testing 00:02:59
    • White Box Versus Black Box Versus Gray Box 00:04:05
    • Vulnerability Assessment Versus Penetration Testing 00:05:06
    • Ethical Hacker Responsibilities and Customer Expectations 00:04:14
    • Laws and Legal Obligations 00:04:35
  2. Chapter 2 : Ethical Hacking Process
    • Preparation Steps for Penetration Testing 00:04:16
    • First Step of Penetration Testing – Reconnaissance 00:04:01
    • Scanning, Enumeration, and Fingerprinting 00:03:33
    • Vulnerability Assessment 00:05:22
    • Exploitation and Access 00:05:01
    • Reporting 00:03:56
  3. Chapter 3 : Creating the Test Lab with Kali Linux
    • Test Lab Requirements 00:04:49
    • Diagram and Design 00:03:46
    • Test Connectivity 00:09:30
  4. Chapter 4 : Reconnaissance
    • Passive Reconnaissance – Part 1 00:07:04
    • Passive Reconnaissance – Part 2 00:05:23
    • Active Reconnaissance 00:06:31
    • Dmitry 00:04:10
    • Maltego 00:08:56
  5. Chapter 5 : Scanning – Part 1
    • TCP, UDP and, ICMP Scanning 00:04:36
    • Nmap – ICMP Scan 00:04:40
    • Nmap – TCP Scan 00:05:12
    • Nmap – Advanced TCP Scans 00:04:47
    • Nmap – UDP Scan 00:05:21
  6. Chapter 6 : Scanning – Part 2
    • OS Detection 00:05:50
    • Avoid Detection 00:06:47
    • Nmap – Scripts and Script Engine 00:05:38
    • Nmap Troubleshooting 00:06:51
    • hping3 00:09:26
  7. Chapter 7 : Vulnerability Scanning and Exploitation
    • Nikto 00:05:43
    • Sparta 00:03:37
    • Ettercap 00:04:45
    • Metasploit 00:05:11
    • Armitage 00:05:31
  8. Chapter 8 : Exploitation and Backdoors
    • Spear Phishing Attacks 00:05:42
    • Credential Harvesting with Website Cloning 00:03:27
    • Netcat 00:03:08
    • John the Ripper 00:03:44
  9. Oreilly - Learning Kali Linux


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss