Free Sample
+ Collection
Code Files

Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]

Justin Hutchens

Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux
RRP $84.99

Want this title & more?

$12.99 p/month

Subscribe to PacktLib

Enjoy full and instant access to over 2000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.

Video Details

ISBN 139781782162926
Course Length2 hours 44 minutes

About This Video

  • This course will offer a complete roadmap for the penetration testing process from start to finish.
  • Experience hands-on video demonstrations regarding how to use an extensive collection of tools within the Kali-Linux environment to perform penetration tests against every aspect of a target network.
  • Advanced techniques with detailed explanations that are useful to novice users and experienced viewers alike

Who This Video Is For

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.

Table of Contents

Lab Preparation
Developing a Network Environment
How to Install Oracle VirtualBox
How to Install VMware Player
How to Install Kali Linux
Increasing Network Attack Surface
Information Gathering and Reconnaissance
Passive Reconnaissance
Google Hacking
Subdomain Enumeration with Google Hacking
Reconnaissance Tools (Dmitry & Goofile)
Network Enumeration with Maltego
Target Discovery
Layer 2 Discovery
Layer 3 Discovery
Host Discovery with nmap
Network Discovery with Scapy
Fingerprinting Operating Systems
Scanning and Enumeration
Scanning with nmap
Scanning with Zenmap
Nmap Scripting
Zombie Scanning
Service Identification
Vulnerability Mapping
Metasploit Auxilliary Scans
Installing Nessus
Nessus Scanning
Nessus Policies
Nessus Result Analysis
Exploitation with Metasploit
Metasploit Framework
Meterpreter Basics
Meterpreter - Advanced Exploitation
Installing Metasploit Pro
Exploitation with Metasploit Pro
Hands-on Exploitation
Exploit Database
Social Engineering Toolkit - Credential Harvester
Burp Suite Intruder
Web Application Exploitation
Maintaining Access
Privilege Escalation
Hash Identifier / Find-My-Hash
John the Ripper
Johnny / xHydra

What You Will Learn

  • Prepare a fully-functional and low-budget security lab, where you can practice and develop your penetration testing skills without fear of legal consequence
  • Gather information about a target with advanced reconnaissance techniques
  • Identify target systems on a network using host discovery tools
  • Identify services running on target systems by scanning and enumeration
  • Discover vulnerabilities to determine potential attack vectors
  • Launch automated exploits and payloads using the Metasploit Framework
  • Learn a variety of hands-on techniques to exploit target systems
  • Establish backdoors to ensure continued access
  • Escalate privileges to acquire maximum control over compromised systems

In Detail

Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.

Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.

It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.



Read More

Recommended for You