Introduction
In this course, you will learn how to perform penetration testing and ethical hacking with Kali Linux. You will gain hands-on experience in exploiting vulnerabilities, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, and performing privilege escalation.
ðŊ Tasks
In this course, you will learn:
- How to use Metasploit for penetration testing
- How to gather target host information using various security tools
- How to perform network scanning with Nmap and Metasploit
- How to scan for network service security vulnerabilities
- How to use Kali vulnerability scanning tools
- How to develop a new Metasploit scanner
- How to attack the Ingreslock backdoor vulnerability
- How to exploit Samba and Unreal IRCd vulnerabilities
- How to brute-force SSH and VNC remote connections
- How to attack Distcc to gain privileges
- How to perform Linux server privilege escalation
- How to exploit Tomcat, NFS, FTP, and Telnet vulnerabilities
- How to create PDF files with Windows backdoors
- How to create backdoors and clear traces after an attack
ð Achievements
After completing this course, you will be able to:
- Perform end-to-end penetration testing, including information gathering, vulnerability analysis, exploitation, and maintaining access
- Effectively use Kali Linux and its tools for ethical hacking and security testing
- Identify and exploit a variety of vulnerabilities in network services and applications
- Develop custom security tools and scanners
- Escalate privileges on compromised systems
- Create and deploy malicious payloads, including backdoors in PDF files