Fundamentals of Kali Linux

Fundamentals of Kali Linux
Fundamentals of Kali Linux

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 2.5 Hours | 418 MB
eLearning | Skill level: All Levels

Explore Kali Linux as you learn the fundamentals

Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.

In this course we’ll explore how we can use Kali Linux to test systems for weaknesses. We’ll look at how to establish a virtual network of systems to use as a learning environment for Kali. And we’ll look at the Kali system and we’ll demonstrate some of the tools provided by Kali for testing system.

We’ll first start by taking a look at Oracle’s VirtualBox environment. And then we get into building a network of testing target. We’lll then describe to Kali operating system in this extensive set of tools for information gathering and system testing.

When you finish this course, you’ll have a great understanding of how to set up a virtual test network, and use it to test systems for vulnerabilities.

What You Will Learn

  • Learn How to use Kali Linux
  • Understand basic principals of ethical hacking
  • Setting up a virtual lab
  • Installing virtual machines and appliances
  • Overview of the tools and explore the applications in Kali Linux
+ Table of Contents

1 Welcome
2 Introduction

Virtual Lab Setup
3 Virtualization system
4 Virtual Lab Setup
5 Installing virtual machines
6 Installing appliances
7 Getting Metasploitable and Windows VMs
8 Working with advanced configuration in VirtualBox

Exploring Kali
9 Exploring the quick access list
10 Settings pane
11 Exploring the applications in Kali
12 Updating Kali

Information Gathering
13 Reviewing the tools
14 Introducing DMitry and DNSenum
15 Introducing Maltego

Vulnerability Analysis
16 Tools
17 Install and Run OpenVAS
18 Custom scan with OpenVAS
19 Explore the OpenVAS menu
20 Vega

Passwords and Hashes
21 Password Testing
22 Use command-line tools
23 Windows Credential Editor
24 Using John the Ripper in Linux
25 Pass the hash
26 Use Rainbow Tables

27 Exploitation tools
28 Creating Trojans with msfvenom
29 Exploiting with Armitage
30 Pivot through a network
31 Getting stealth and persistent access

Download from Turbobit

Download from DepositFiles

Download from Rapidgator