Author
Updated
6/12/2017Released
3/24/2016This course will give prospective ethical hackers a short overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation.
Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills.
- Overview of Metaploit, Maltego, and Wifite
- Setting up a virtual lab with Oracle VM
- Installing virtual machines and appliances
- Exploring the Kali Linux applications
- Gathering information with DMitry and DNSenum
- Conducting a vulnerability assessment
- Installing OpenVAS and Vega
- Testing passwords
- Exploiting targets
Skill Level Beginner
Duration
Views
- [Voiceover] Everyday, we hear of another data breach. Big or small, public or private. In the digital world, business is connected. And that means it's exposed. I'm Malcolm Shore, and I've spent a career helping government and businesses protect their systems. Minimizing the risk of being today's data breach means testing systems thoroughly, before they go online. And that's the role of the penetration tester. The tool most commonly used to do this testing is Kali Linux.
In this course I'll explore how we can use Kali Linux to test systems for weaknesses. We'll look at how to establish a virtual network of systems to use as a learning environment for Kali. And we'll look at the Kali system and I'll demonstrate some of the tools provided by Kali for testing system. I'll start by taking a look at Oracle's VirtualBox environment. And I'll build a network of testing target. I'll then describe to Kali operating system in this extensive set of tools for information gathering and system testing.
When you finish this course, you'll have a great understanding of how to set up a virtual test network, and use it to test systems for vulnerabilities.
Q: This course was updated on 06/12/2017. What changed?Â
A: The following topics were updated: setting up a virtual lab, installing appliances, Windows Credential Editor, using John for Windows passwords, pass the hash, using rainbow tables, exploiting with Armitage, pivoting through a network, and getting stealth and persistent access. In addition, a new video was added that shows how to create Trojans with msfvenom.
Related Courses
-
Learning CentOS Linux
with Scott Simpson1h 32m Beginner -
Learning Fedora Linux
with Scott Simpson1h 9m Beginner
-
Introduction
-
Welcome1m 18s
-
-
1. Setting Up the Virtual Lab
-
Setting up a virtual lab7m 35s
-
Installing virtual machines8m 11s
-
Installing Kali Linux3m 15s
-
Installing appliances7m 34s
-
2. Introducing Kali
-
What is Kali?2m 13s
-
Update Kali1m 49s
-
-
3. Information Gathering (Understanding the Target)
-
Reviewing the tools1m 4s
-
Introducing DMitry2m 34s
-
Introducing DNSenum2m 59s
-
Introducing Maltego6m 57s
-
-
4. Vulnerability Analysis
-
Install OpenVAS2m 57s
-
Run an OpenVAS scan6m 16s
-
Custom scan with OpenVAS1m 22s
-
Install Vega1m 6s
-
Web crawling with Vega3m 45s
-
Use Vega as a web proxy4m 19s
-
5. Passwords and Hashes
-
Password testing3m 17s
-
Use command-line tools3m 18s
-
Windows Credential Editor3m 15s
-
Use John the Ripper in Linux1m 54s
-
Explore Johnny's options3m 57s
-
Pass the hash3m 58s
-
Use Rainbow Tables3m 39s
-
-
6. Exploiting Targets
-
Exploiting with Armitage3m 31s
-
Pivot through a network5m 51s
-
Conclusion
-
Next steps59s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Welcome