Tutorialspoint
Subscription Includes
$ 130   9.99

IT Security Gumbo: Exploitation with Kali

Created by Corey Charles, Last Updated 24-Aug-2020, Language:English

IT Security Gumbo: Exploitation with Kali

Hands On Penetration Testing with Kali Linux

Created by Corey Charles, Last Updated 24-Aug-2020, Language:English

What Will I Get ?

  • Perform remote exploitation of systems
  • Escalate local privileges to root level
  • Utilize a variety of industry standard penetration testing tools within the Kali Linux distro

Requirements

  • Basic Linux knowledge
  • Basic networking knowledge
  • Virtual Box
  • Windows 7 VM
  • Desktop or Laptop with a minimum of 2GB RAM

Description

IT Security Gumbo: Exploitation with Kali

This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

1. Exploiting Services

  • Samba Exploit
  • IRC Exploit
  • Java RMI Exploit

2. Exploiting Shell shock

  • Using MSF
  • Using HTTP
  • Using BadBash

3. Exploiting Privilege Escalation

  • Kernel Exploit
  • Empire and Setoolkit

Who this course is for:

  • Cybersecurity Students
  • Cybersecurity Professionals
  • CEH Candidates

Course Content

Corey Charles

Security+, Qualys Vulnerability Management Specialist, MSIS

Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 11 years experience in IT Security with a direct focus in Vulnerability Management. Mr. Charles also taught  on the collegiate level, teaching IT Security at Herzing University.

Mr. Charles also holds two Bachelors of Arts Degrees, Digital Design and Media Arts, one Associates, Digital Design from Tulane University. Two Master Degrees from Strayer University, Master of Science in Computer Security Management and Master of Science in Computer Forensics Management. He holds an Executive Graduate Certification in Computer Networking.