Description
In this course, you will :
- Setting Up The Laboratory.
- Install Kali Linux - a penetration testing operating system.
- Install Windows & vulnerable operating systems as virtual machines for testing.
- Discover vulnerable applications.
- Vulnerability scanning, Exploit, Post Exploit, Payload.
- Gain control over computer systems using server side attacks.
- Exploit vulnerabilities to gain control over systems.
- Gathering password hashes, cracking passwords, taking screenshots, logging keystrokes etc..
- Using backdoors to persist on the victim machine.
- Information Gathering Over the Internet Tools.
- Web App Hacking Tools.
- Social Engineering Toolkit (SET) for Phishing.
- The very latest up-to-date information and methods.