Description
In this course, you will learn:
- Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers.
- It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers
- Prospective ethical hackers a short overview of the tools in Kali Linux
- How to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation.
Syllabus:
- Introduction
- Learning how to use Kali Linux to succeed in ethical hacking
- What you should know
- Disclaimer
1. Testing Lab
- Introduction to virtualization
- Setting up a virtual lab
- A first look at VirtualBox
- Installing Kali as an appliance
- Going Tiny with Linux
- Installing Windows
- Using the advanced options
2. Kali
- Starting with Kali
- Customizing the terminal window
- Using the application menu
- Setting up favorites
- Updating Kali
- Browsing with Kali
- Installing additional applications into Kali
3. Information Gathering
- Information gathering with Kali
- Using Deepmagic for reconnaissance
- Using DNS for passive reconnaissance
- Active target reconnaissance
- Taking a quick peek at a web server
4. Vulnerability Scanning
- Vulnerability scanning with Kali
- Using Nikto to scan a web server
- Using Burp Suite to scan a website
- Running an OpenVAS scan
5. Password Cracking
- Introducing password recovery
- Using command-line tools for dictionaries
- Having a ripping good time
- Cracking Windows passwords
6. Exploiting Targets Using Kali
- Overview of exploitation tools
- Exploiting Linux with Metasploit
- Graphical exploits with Armitage
- Exploiting Windows with venom