Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of Kali Linux.
- Installing and configuring Kali Linux.
- Using and updating Kali Linux.
Kali Linux Files, Directories, and Permissions
- Customizing the workspace and panel.
- Creating directories and files.
- Finding and locating files and directories.
- Commands and man page navigation.
- Linux file permissions and hidden files.
- Managing and terminating Linux processes.
Advanced Commands
- HTOP and ATOP extended commands.
- Searching lines: head, tail, wc, and history.
- Persistent aliases and real-world use cases.
- Command-line web downloader.
- Scripting in the bash shell.
- Sorting results using grep and cut.
Pre-engagement and Information Gathering
- Rules of engagement.
- Standards for penetration testing execution.
- DNS and route analysis.
- Network and port scanning.
- SMB and OSINT analysis.
Vulnerability Scanning and Analysis
- Web application vulnerability scanning.
- CMS and framework identification.
- Force browsing DIRs and files using ZAP.
- Web crawling and directory listing.
- Vulnerability analysis using Nmap NSE and Nikto.
- Vulnerability analysis using Legion and Unix-privesc-check.
- Firewall and IDS evasion with Nmap.
Exploitation
- Exploiting SQL injection.
- Blind SQL injection attacks in action.
- Compromising outdated web applications to take over the server.
Reporting
- Penetration testing reports.
- Engagement details.
Summary and Next Steps
Requirements
- Foundational understanding of ethical hacking.
- Basic familiarity with Kali Linux penetration testing.
Audience
- Ethical hackers.
- Penetration testers.
- Security engineers.
- IT professionals.
14 Hours