Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

IT Security Gumbo: Exploitation with Kali

person icon Corey Charles

4.6

IT Security Gumbo: Exploitation with Kali

Hands On Penetration Testing with Kali Linux

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Corey Charles

category icon IT & Software,Network & Security,Gumbo

Lectures -9

Duration -1 hours

4.6

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

IT Security Gumbo: Exploitation with Kali

This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

1. Exploiting Services

  • Samba Exploit
  • IRC Exploit
  • Java RMI Exploit

2. Exploiting Shell shock

  • Using MSF
  • Using HTTP
  • Using BadBash

3. Exploiting Privilege Escalation

  • Kernel Exploit
  • Empire and Setoolkit

Who this course is for:

  • Cybersecurity Students
  • Cybersecurity Professionals
  • CEH Candidates

Goals

What will you learn in this course:

  • Perform remote exploitation of systems
  • Escalate local privileges to root level
  • Utilize a variety of industry standard penetration testing tools within the Kali Linux distro

Prerequisites

What are the prerequisites for this course?

  • Basic Linux knowledge
  • Basic networking knowledge
  • Virtual Box
  • Windows 7 VM
  • Desktop or Laptop with a minimum of 2GB RAM
IT Security Gumbo: Exploitation with Kali

Curriculum

Check out the detailed breakdown of what’s inside the course

Exploiting Services
3 Lectures
  • play icon Samba Exploit 07:00 07:00
  • play icon IRC Exploit 07:02 07:02
  • play icon Java RMI Exploit 10:28 10:28
Exploiting Shell Shock
3 Lectures
Tutorialspoint
Exploiting Privilege Escalation
2 Lectures
Tutorialspoint

Instructor Details

Corey Charles

Corey Charles

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515