Plan Szkolenia

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Kali Linux Files Directories and Permissions

  • Customizing workspace and panel
  • Creating directories and files
  • Finding and locating files and directories
  • Commands and man page
  • Linux files permissions and hidden files
  • Managing and killing the Linux process

Advanced Commands

  • HTOP and ATOP extended commands
  • Searching lines head-and-tails-wc-history
  • Persistent aliases and real-world cases
  • Command-line web downloader
  • Scripting in bash shell
  • Sorting results using grep and cut

Pre-engagement and Information Gathering

  • Rules of engagement
  • Standards of penetration testing execution
  • DNS and route analysis
  • Network and port scanning
  • SMB and OSINT analysis

Vulnerability Scanning and Analysis

  • Web application vulnerability scanning
  • CMS and framework identification
  • Force browsing DIRs and files using ZAP
  • Web crawling and directory listing
  • Vulnerability analysis using Nmap NSE and Nikto
  • Vulnerability analysis using legion and Unix-privesc-check
  • Firewall and IDS evasion with Nmap

Exploitation

  • Exploiting SQL injection
  • Blind SQL injection attack in-action
  • Outdated web application to server takeout

Reporting

  • Penetration testing reports
  • Engagement details

Summary and Next Steps

Wymagania

  • Basic understanding of ethical hacking
  • Basic knowledge of Kali Linux penetration testing

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
 14 godzin

Liczba uczestników



Cena za uczestnika

Opinie uczestników (3)

Szkolenia Powiązane

Kali Linux Penetration Testing (Advanced)

21 godzin

Penetration Testing: Python and Kali Linux

14 godzin

Wprowadzenie do systemu Linux

14 godzin

Alpine Linux

7 godzin

Automatyzacja budowy aplikacji z użyciem Autotools

14 godzin

Introduction to Cumulus Linux

14 godzin

DNS and BIND: Setting Up, Managing and Securing Your DNS Server

14 godzin

Top 4 Linux/Unix Servers - DNS,Web,Mail and Database

28 godzin

Enterprise Linux (CentOS, RHEL, Rocky Linux i inne) - wprowadzenie do administracji i pracy w linii komend

21 godzin

Enterprise Linux (CentOS, RHEL, Rocky Linux i inne) - administracja siecią, bezpieczeństwem i wprowadzenie do kontenerów

14 godzin

Enterprise Linux (CentOS, RHEL, Rocky Linux i inne) - administracja pamięcią masową (LVM), lokalnymi użytkownikami oraz pakietami i usługami

14 godzin

Running Kubernetes on Fedora CoreOS

14 godzin

Go for Systems Programming

35 godzin

Intermediate Unix

21 godzin

LEDE: Set Up a Linux Wireless Router

7 godzin

Powiązane Kategorie