IT Security Gumbo: Exploitation with Kali

Hands On Penetration Testing with Kali Linux

  Corey Charles

   IT & Software, Network & Security, Network Security

  Language - English

   Published on 08/2020



IT Security Gumbo: Exploitation with Kali

This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

1. Exploiting Services

  • Samba Exploit
  • IRC Exploit
  • Java RMI Exploit

2. Exploiting Shell shock

  • Using MSF
  • Using HTTP
  • Using BadBash

3. Exploiting Privilege Escalation

  • Kernel Exploit
  • Empire and Setoolkit

Who this course is for:

  • Cybersecurity Students
  • Cybersecurity Professionals
  • CEH Candidates

What Will I Get ?

  • Perform remote exploitation of systems
  • Escalate local privileges to root level
  • Utilize a variety of industry standard penetration testing tools within the Kali Linux distro


  • Basic Linux knowledge
  • Basic networking knowledge
  • Virtual Box
  • Windows 7 VM
  • Desktop or Laptop with a minimum of 2GB RAM
Course Rating

    Feedbacks (0)

  • No Feedbacks Yet..!

We make use of cookies to improve our user experience. By using this website, you agree with our Cookies Policy.