Tutorialspoint

IT Security Gumbo: Exploitation with Kali

Hands On Penetration Testing with Kali Linux

Course Description

IT Security Gumbo: Exploitation with Kali

This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

1. Exploiting Services

  • Samba Exploit
  • IRC Exploit
  • Java RMI Exploit

2. Exploiting Shell shock

  • Using MSF
  • Using HTTP
  • Using BadBash

3. Exploiting Privilege Escalation

  • Kernel Exploit
  • Empire and Setoolkit

Who this course is for:

  • Cybersecurity Students
  • Cybersecurity Professionals
  • CEH Candidates

Goals

  • Perform remote exploitation of systems
  • Escalate local privileges to root level
  • Utilize a variety of industry standard penetration testing tools within the Kali Linux distro

Prerequisites

  • Basic Linux knowledge
  • Basic networking knowledge
  • Virtual Box
  • Windows 7 VM
  • Desktop or Laptop with a minimum of 2GB RAM
Show More

Curriculum

Tutorialspoint
Tutorialspoint
Feedbacks
  • No Feedbacks Posted Yet..!
IT Security Gumbo: Exploitation with Kali
This Course Includes
  • 1 hours
  • 9 Lectures
  • Completion Certificate Sample Certificate
  • Lifetime Access Yes
  • Language English
  • 30-Days Money Back Guarantee

Sample Certificate

sample certificate

Use your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

We have 30 Million registered users and counting who have advanced their careers with us.

X

Sample Certificate

Talk to us

1800-202-0515