Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux.
  • Installing and configuring Kali Linux.
  • Using and updating Kali Linux.

Kali Linux Files, Directories, and Permissions

  • Customizing the workspace and panel.
  • Creating directories and files.
  • Finding and locating files and directories.
  • Commands and man page navigation.
  • Linux file permissions and hidden files.
  • Managing and terminating Linux processes.

Advanced Commands

  • HTOP and ATOP extended commands.
  • Searching lines: head, tail, wc, and history.
  • Persistent aliases and real-world use cases.
  • Command-line web downloader.
  • Scripting in the bash shell.
  • Sorting results using grep and cut.

Pre-engagement and Information Gathering

  • Rules of engagement.
  • Standards for penetration testing execution.
  • DNS and route analysis.
  • Network and port scanning.
  • SMB and OSINT analysis.

Vulnerability Scanning and Analysis

  • Web application vulnerability scanning.
  • CMS and framework identification.
  • Force browsing DIRs and files using ZAP.
  • Web crawling and directory listing.
  • Vulnerability analysis using Nmap NSE and Nikto.
  • Vulnerability analysis using Legion and Unix-privesc-check.
  • Firewall and IDS evasion with Nmap.

Exploitation

  • Exploiting SQL injection.
  • Blind SQL injection attacks in action.
  • Compromising outdated web applications to take over the server.

Reporting

  • Penetration testing reports.
  • Engagement details.

Summary and Next Steps

Requirements

  • Foundational understanding of ethical hacking.
  • Basic familiarity with Kali Linux penetration testing.

Audience

  • Ethical hackers.
  • Penetration testers.
  • Security engineers.
  • IT professionals.
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories