Kali Server Exploitation in Action

Beginner

This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege escalation. Through hands-on labs, you'll gain end-to-end pentesting skills - information gathering, vulnerability analysis, exploitation, and maintaining access.

CybersecurityPen Testing

Introduction

In this course, you will learn how to perform penetration testing and ethical hacking with Kali Linux. You will gain hands-on experience in exploiting vulnerabilities, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, and performing privilege escalation.

ðŸŽŊ Tasks

In this course, you will learn:

  • How to use Metasploit for penetration testing
  • How to gather target host information using various security tools
  • How to perform network scanning with Nmap and Metasploit
  • How to scan for network service security vulnerabilities
  • How to use Kali vulnerability scanning tools
  • How to develop a new Metasploit scanner
  • How to attack the Ingreslock backdoor vulnerability
  • How to exploit Samba and Unreal IRCd vulnerabilities
  • How to brute-force SSH and VNC remote connections
  • How to attack Distcc to gain privileges
  • How to perform Linux server privilege escalation
  • How to exploit Tomcat, NFS, FTP, and Telnet vulnerabilities
  • How to create PDF files with Windows backdoors
  • How to create backdoors and clear traces after an attack

🏆 Achievements

After completing this course, you will be able to:

  • Perform end-to-end penetration testing, including information gathering, vulnerability analysis, exploitation, and maintaining access
  • Effectively use Kali Linux and its tools for ethical hacking and security testing
  • Identify and exploit a variety of vulnerabilities in network services and applications
  • Develop custom security tools and scanners
  • Escalate privileges on compromised systems
  • Create and deploy malicious payloads, including backdoors in PDF files

Teacher

labby

Labby

Labby is the LabEx teacher.