Security Testing and Ethical Hacking with Kali Linux

Security Testing and Ethical Hacking with Kali Linux

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 6h 40m | 3.03 GB

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you’ll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you’ll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you’ll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you’ll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course.

  • Learn Kali toolsets that manipulate and manage large volumes of data acquired during security tests
  • Discover Kali toolsets that allow you to capture test notes and integrate them into reports
  • Explore Kali toolsets that enable collaboration and reporting among your security colleagues
Table of Contents

1 Introduction
2 About the Author
3 System Requirements
4 Acquiring Kali Linux
5 Tool Categories Available in Kali Linux
6 Booting to Kali
7 Installing Kali
8 Overview of the User Interface
9 Customizing Kali
10 Getting Updated from the UI
11 System Settings
12 Using the Terminal
13 Managing Directories
14 File Permissions
15 Viewing Files
16 Using grep
17 Using Pipes to Chain Commands
18 Editing Files
19 Getting Help from the Command Line
20 Date Management
21 Listing Services
22 Starting and Stopping Services
23 The Package Manager
24 Updating and Searching for Packages
25 Installing and Updating Packages
26 Listing and Erasing Packages
27 Building Packages from Source
28 Managing Repositories
29 Chapter Introduction
30 About the Author
31 System Requirements
32 Starting with Maltego Community Edition
33 Running Machines in Maltego
34 Use Maltego to Stalk a Company
35 Obtaining Company Footprint with Maltego
36 Looking up People in Maltego
37 Using Transforms
38 Viewing Graphs
39 Creating a Machine
40 Using dig
41 Using nslookup
42 Using dnswalk
43 Using DNSRecon
44 Using dnsmap
45 Using dnsenum
46 Passive Network Scanning
47 Acquiring Information from Metadata (Metagoofil)
48 Using Miranda for UPnP
49 Using Recon-ng
50 Using theHarvester
51 Using snmp-check
52 Using Parsero
53 Chapter Introduction
54 About the Author
55 System Requirements
56 Quick Start Scanning with ZAProxy
57 Using ZAProxy as a Proxy
58 Spidering Using ZAProxy
59 Active Scanning Using ZAProxy
60 Fuzzing Attacks Using ZAProxy
61 Using Breakpoints with ZAProxy
62 Using w3af
63 Targeted Scans Using w3af
64 Using Arachni
65 Using Vega
66 Using skipfish
67 Using Xsser
68 Using Lynis for Local Vulnerability Identification
69 Getting Started with OpenVAS
70 Accessing OpenVAS via the Web Interface
71 Quick Start Scanning with OpenVAS
72 Setting Policy with OpenVAS
73 Reviewing Reports in OpenVAS
74 Using Root Kit Hunter
75 Using Yersinia for Network Vulnerabilities
76 Using sqlmap
77 Using sqlninja
78 Using HexorBase
79 Using Jsql
80 Chapter Introduction
81 About the Author
82 System Requirements
83 Exploiting with w3af
84 Exploiting with jboss-autopwn
85 Using Commix
86 Using Maltego Teeth
87 Using BeEF
88 Adding Vulnerabilities with Backdoor Factory
89 Basic Vulnerable Program
90 Compiling and Running Vulnerable Program
91 About the Stack
92 Using objdump
93 Using dd debugger
94 Setting Breakpoints
95 Looking at Stack Using dd
96 Manipulating the Instruction Pointer
97 Using Social Engineer’s Toolkit
98 Using Metasploit
99 Importing Information
100 Identifying Vulnerabilities
101 Locating Modules
102 Exploiting a Vulnerability
103 Privilege Escalation to Root Using udev
104 Maintaining Access Using Cymothoa
105 Chapter Introduction
106 About the Author
107 System Requirements
108 Unshadow Passwd Files
109 Word Lists
110 Word Lists Available in Kali
111 Using John Using Brute Force Attack
112 Using John with Wordlist
113 Using Ophcrack for Rainbow Tables
114 Using Ncrack
115 Web Application Password Attacks
116 Using patator
117 Using Hydra
118 Hydra Attacks Against Protocols
119 Text Files for Notes
120 Using Leafpad
121 Using CutyCapt
122 Using Faraday IDE
123 Using KeepNote
124 Using recordmydesktop