Mastering Kali Linux

Mastering Kali Linux

A step–by-step guide to help you learn different techniques you can use in order to optimize your pen-testing time, speed, and results.

Bestseller
Created By: Aubrey Love II
15.87 9.52

About This Course

Become a master at any hackers game by discovering and understanding each of the major tools that every hacker is currently using.

You will discover proper techniques to hack into any WordPress websites to test for vulnerabilities and weaknesses. Then dive deep into website and server scanning as well as network scanning and testing for any open security breaches. In addition, you will get introduced to bluetooth hacking for any open bluetooth enabled devices near you. Finally, explore the ultimate Social Engineering Toolkit embedded inside of your Kali machine.

By the end of this course, you will have mastered Kali Linux in order to be the most efficient ethical hacker to carry out proper penetration testing upon your target, as well as discovering how to increase your own networks security.

Other Information

  • Certificate will provided in this course on Completion
  • Full lifetime access
  • Available on Mobile & Laptop

What Students Will Learn In Your Course?

  • Scan your target using Recon Work
  • Extract usernames from WordPress websites
  • Perform master scanning techniques to find open ports, IP address ranges, and more.
  • Explore website penetration with WPScan and the Harvester
  • Hack nearby Bluetooth devices
  • Master your companies' networks and carry out expert scanning and testing.
  • Trace IP addresses and software packages and get server Intel with the Nikto and Vega methods.
  • Set up a proper password dictionary and discover the best methods for brute-forcing techniques.

Are There Any Course Requirements Or Prerequisites?

Some prior exposure to the basics of penetration testing/ethical hacking would be helpful to make the most out of this course. Prior experience of Kali is required.

Who Are Your Target Students?

If you are a Penetration Tester, IT professional, or a security consultant and want to maximize your network testing using some of the advanced features of Kali Linux, then this course is for you! Learn techniques for exploiting vulnerabilities in servers and websites. Learn how to master some of the advanced features nested inside Kali Linux.
 

Course Content

  • 37 lectures
  • 02:26:52
  • The Course Overview
    00:05:52
  • Performing the Right Recon Work
    00:05:07
  • Installing Recon-NG
    00:08:33
  • Integrating Twitter API‚Aos
    00:04:20
  • Discovering Modules with Recon-NG
    00:03:46
  • Exploiting Modules with Recon-NG
    00:04:56
  • Scanning WordPress Sites
    00:04:41
  • Enumerating Usernames
    00:04:12
  • Cultivating a Password Dictionary
    00:05:26
  • Bruteforcing Login
    00:04:37
  • Discovering Plugins and More!
    00:04:52
  • SQL Databases
    00:03:28
  • Google Dorking
    00:04:56
  • Site Vulnerability Testing
    00:02:48
  • Listing Databases and Tables with SQLMap
    00:02:24
  • Listing Usernames from Tables
    00:02:25
  • Extracting Passwords from Target Columns
    00:02:28
  • Cracking Passwords
    00:03:42
  • Bluetooth Tools
    00:02:11
  • Scan and Ping for Victims
    00:02:58
  • RFComm Channel Surfing
    00:02:04
  • RedFang
    00:04:23
  • Other Tools
    00:03:46
  • Port Scanning
    00:04:04
  • Zombie
    00:02:21
  • Nikto Scanning
    00:06:20
  • Perform a Stealth Scan
    00:03:31
  • Exploring the S.E.T.
    00:01:54
  • Site Cloning
    00:02:31
  • Spear Fishing
    00:05:19
  • Harvester Attacking
    00:02:20
  • Exploiting with Commix
    00:03:34
  • Scanning for Live Hosts
    00:04:16
  • Discovering Open Ports
    00:02:17
  • Find Services Actively Listening
    00:04:27
  • Show Anonymous FTP Logins
    00:03:28
  • Test for Vulnerabilities
    00:06:35
Image

Packt Publication

  • 4.48 (11)
  • 13 Reviews
  • 11 Students
  • 935 Courses