Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Kali Linux Files, Directories, and Permissions

  • Customizing the workspace and panel
  • Creating directories and files
  • Finding and locating files and directories
  • Commands and man pages
  • Linux file permissions and hidden files
  • Managing and killing Linux processes

Advanced Commands

  • HTOP and ATOP extended commands
  • Searching lines, head, tails, wc, history
  • Persistent aliases and real-world cases
  • Command-line web downloader
  • Scripting in the bash shell
  • Sorting results using grep and cut

Pre-engagement and Information Gathering

  • Rules of engagement
  • Standards for penetration testing execution
  • DNS and route analysis
  • Network and port scanning
  • SMB and OSINT analysis

Vulnerability Scanning and Analysis

  • Web application vulnerability scanning
  • CMS and framework identification
  • Force browsing directories and files using ZAP
  • Web crawling and directory listing
  • Vulnerability analysis using Nmap NSE and Nikto
  • Vulnerability analysis using Legion and Unix-privesc-check
  • Firewall and IDS evasion with Nmap

Exploitation

  • Exploiting SQL injection
  • Blind SQL injection attack in action
  • Exploiting outdated web applications to take over the server

Reporting

  • Penetration testing reports
  • Engagement details

Summary and Next Steps

Requirements

  • Basic understanding of ethical hacking
  • Basic knowledge of Kali Linux penetration testing

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories