Kali Server Exploitation in Action

Beginner

This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege escalation. Through hands-on labs, you'll gain end-to-end pentesting skills - information gathering, vulnerability analysis, exploitation, and maintaining access.

cybersecuritykalilinux

In this course, you will learn how to perform penetration testing and ethical hacking with Kali Linux. You will gain hands-on experience in exploiting vulnerabilities, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, and performing privilege escalation.

🎯 Tasks

In this course, you will learn:

  • How to use Metasploit for penetration testing
  • How to gather target host information using various security tools
  • How to perform network scanning with Nmap and Metasploit
  • How to scan for network service security vulnerabilities
  • How to use Kali vulnerability scanning tools
  • How to develop a new Metasploit scanner
  • How to attack the Ingreslock backdoor vulnerability
  • How to exploit Samba and Unreal IRCd vulnerabilities
  • How to brute-force SSH and VNC remote connections
  • How to attack Distcc to gain privileges
  • How to perform Linux server privilege escalation
  • How to exploit Tomcat, NFS, FTP, and Telnet vulnerabilities
  • How to create PDF files with Windows backdoors
  • How to create backdoors and clear traces after an attack

🏆 Achievements

After completing this course, you will be able to:

  • Perform end-to-end penetration testing, including information gathering, vulnerability analysis, exploitation, and maintaining access
  • Effectively use Kali Linux and its tools for ethical hacking and security testing
  • Identify and exploit a variety of vulnerabilities in network services and applications
  • Develop custom security tools and scanners
  • Escalate privileges on compromised systems
  • Create and deploy malicious payloads, including backdoors in PDF files

Teacher

labby
Labby
Labby is the LabEx teacher.

Recommended For You

no data