Tutorialspoint

IT Security Gumbo: Exploitation with Kali

Hands On Penetration Testing with Kali Linux

  Corey Charles

   IT & Software, Network & Security, Network Security

   Published on 08/2020

0

Description

IT Security Gumbo: Exploitation with Kali

This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

1. Exploiting Services

  • Samba Exploit
  • IRC Exploit
  • Java RMI Exploit

2. Exploiting Shell shock

  • Using MSF
  • Using HTTP
  • Using BadBash

3. Exploiting Privilege Escalation

  • Kernel Exploit
  • Empire and Setoolkit

Who this course is for:

  • Cybersecurity Students
  • Cybersecurity Professionals
  • CEH Candidates

What Will I Get ?

  • Perform remote exploitation of systems
  • Escalate local privileges to root level
  • Utilize a variety of industry standard penetration testing tools within the Kali Linux distro

Requirements

  • Basic Linux knowledge
  • Basic networking knowledge
  • Virtual Box
  • Windows 7 VM
  • Desktop or Laptop with a minimum of 2GB RAM
0
Course Rating
0%
0%
0%
0%
0%

    Feedbacks (0)

  • No Feedbacks Yet..!
IT Security Gumbo: Exploitation with Kali
This Course Includes :

1 hours

8 Lectures

Lifetime Access

30-Days Money Back Guarantee