Kali Linux Kali Linux Penetration Testing

Kali Linux Penetration Testing

Catalog: Kali Linux
Short name: Upgrade - KLPT
Course start date: 2023-02-21
Paystack

Description

Welcome to eduCBA’s Kali Linux Training. Kali Linux, previously known as Backtrack was founded in 2006. It became famous with Backtrack 5, the most popular pentesting live CD. Later, it was relaunched with Kali Linux 1.0, and now officially as Kali Linux 2.0 Sana in 2015 with even GNOME 3 user interface. Kali Linux is developed and maintained by Offensive security pvt.Ltd.

Kali Linux is one of the most leading distros in the world of Penetration testing. Penetration testing or Pentesting or more often Known as Ethical Hacking (much wider term than Pentesting however) is a test done in a practical environment to test the reliability and security of systems in non-ordinary situations. Kali Linux, previously known as Backtrack is based on Debian which is extremely famous for its Security and stability. There are lots of other operating systems like the Arch Linux in which you can build everything from source, or other ready-made operating systems like the parrot OS, Black Arch or even the BackBox. But the reason I prefer Kali Linux is because it is extremely portable, highly secure and is specifically hand-made for the sole purpose of attacking and penetrating other operating systems.

Kali Linux is not only available on Desktops and laptops, but is also available to other hardware devices like the Trim Slice, Raspberry Pi, USB Armory and even ARM based Chrome books. Besides these, they are run in ch-root environment on cell phone devices like the OnePlus One, Nexus series(from 4 till 9). And similar to Arch Linux, Kali also provides extreme OS customization and even building it from source. Kali Linux for Cell Phone devices are known as Net-Hunter. Kali Linux has an open source community to pro-actively support ARM devices. It has a LUKS Nuke Encryption built-in feature which makes every bit of the hard disk, including the metadata, the unnecessary spaces, blocks and clusters between data, hidden files and every other portion of data encrypted to the extreme stage. The official website of Kali Linux https://www.kali.org/ has custom downloadable ISO image files as per user needs like the Kali Linux 64 and 32 bit, light and mini version which are small image files as small as upto 28 Megabytes of data, and also images for armel and armhf versions. It has a totally separate website for other hardware like the Nethunter.org for the ARM based devices. They have separate Vmware and Virtual Box optimized images for installing them into the virtual chroot environment.

Kali Linux Training also has an extreme Secure and brilliantly optimized version of USB Boot known as the Forensics live boot. Similar to any other Linux live cd, Kali can also be booted with a pendrive as small as upto 8 gigs and it leaves no trace of information or meta-data in the RAM or swap. It is the most versatile type of Operating system ever built in a decade atleast. Kali Linux has more than 400  tools built-in; some specifically optimized and hand-made for Kali such as the Maltego Chlorine, BeEF (Browser Exploitation Framework), John the Ripper password cracker, OCL-hashcat, Setoolkit (Social Engineering Framework), Armitage and the Metasploit Framework (separate from the ones developed by Rapid7). Each of these hacking kits are kept updated on a continuous basis with the help of Regular and Bleeding Edge Repositories.

( Duration-: 18h 05m)

Sections

General
0 activities

Introduction to Ethical Hacking
Penetration Testing
Kali Linux
Operating ASystems
Operating Asystems Continue
Operating Asystems Continue
Installing Operating Systems
Installing VMware Tools
Configuring Kali Linux
Installing Kali Linux on MacBook
What is Footprinting
Footprinting Objectives
Google Hacking
Database and Query Hacking
Database and Query Hacking Continue
WhOIS Lookup
DNS Footprinting
Gathering Network Information
Determining Operation System
Phishing Attacks
Creating Fake Websites
Connecting Information Database
Nmap and ZenMap
Gathering System Information
Gathering System Information Continue
The Harvester
Gathering Email Ids Using The Harvester
WHOIS and Dnsenum
Gathering Subdomain Information
Urlcrazy and Dnsdict6
Enumerating DNS
Gathering website Admin IP Addresses
Social Engineering
Types of Social Engineering
Social Engineering Attacks
Spear-Phishing Attack
Phishing Attack
Fake Page Attacks
Mass Mailer Attack
Types of Computer Malwares
Different Ways of Infecting Viruses
Dangerous Viruses of All time
Melissa Virus and Love Bug
Installing Rootkit Hunter
Command Prompt Backdoor
Command Prompt Backdoor Continue
Backdoor - Gaining Access
Backdoor - Maitaining Access
Backdoor - Maitaining Access Continue
Accessing a Backdoor in Windows 7 Via cmd Prompt
Accessing a Backdoor in Windows 7 Via cmd Prompt Cotinue
Meterpreter Backdoor
I am Root
Forensic Escaping
Hacking win7 SAM Database
Jack the Ripper
Meterpreter Commands
PDF Embedded Trojan Horse
Java Applet Attack Method
Java Runtime Attack Using Phishing Page
MITM Attack
ARP Poisoning
DNS Spoofing vs DNS Poisoning
DNS Spoofing
Using Ettercap
DHCP Spoofing
Port Stealing
ICMP Redirection
ICMP Redirection Continue
More on ICMP Redirection
Killing a Network
Ddosing Unauthorised Network
Driftnet
Evil Grade
Injecting Payload in Updates
Denial of Service Attack
DoS vs DDoS
Levels of Ddos Attacks
Preventing DDoS Attacks
Batch file attack
Unseen DDoS SMB Attack
Hacking Through Android
Android Hacking Applications
Hacking Android via Kali Linux
Introduction to Password Cracking
Password Cracking Srategy
Password Cracking Srategy Continue
Windows Password Cracking
Windows Password Cracking Continue
Linux Hash Cracking
Linux Hash Cracking Continue
Generating wordlist
More on Generating wordlist
CeWL Cracking
WEP and WPA
WPA2
802.1X Standard
Wireless Cracking Via Kali
Cracking Networks
Activating Payloads
Proccess Module
Msfconsole Explained
Msfconsole Commands
Exploits
Payloads
Generating Payloads
Encoders
SQL Injection
SQL Injection to Google Dorks
SQL Mapping via Kali Linux
Gathering Password and Cracking the Hash
Cryptography
Cryptography Continue
Hash Func and Oracle Method
Birthday Theorem and Digital Signature
Pros and Cons of Cryptography
Importing Databases
Exporting Databases
Exporting Databases Continue
Course Certificate

Secure Video
119
Certificate
1
Cost: 5000