Hacking using Kali Linux Course

Learn Hacking using Kali from Scratch

The course intended for any individual who need to take in Ethical Hacking without any preparation utilizing Kali Linux and moving to the universe of expert infiltration testing.

The course acquaints understudies with the most recent moral hacking instruments and methods, including a prodding lab for rehearsing various assaults. Understudies will mimics a full infiltration test from beginning to end.

Moral Hacking utilizing Kali from start to finish is a reasonable security course, . This high level infiltration testing course requires work on, testing, and the capacity to need to learn in a way that will develop your vocation in the data security field.

Enlisted understudies will get each month a virtual machine or distant lab access or a connect to a neighborhood web application as a test and will be mentioned to attempt to hack it, this will keep them include in Ethical Hacking until they arrive at a phase where they can do that in a genuine climate.

Materials and extra resources

1
How to get access to the students portal

Introduction

1
Kali Linux Course Introduction

Setup Your Lab

1
Build your lab
2
Setting up your virtual lab
3
Setting up your workspace

Getting Comfortable with Kali Linux

1
Penetration Testing Phases
2
Kali Linux
3
Finding Your Way Around Kali
4
Update-Upgrade-Kali-linux
5
Find, Locate

Managing Kali Linux Services

1
HTTP Service
2
SSH Service

Essential Tools

1
Netcat
2
Grabing the banner
3
Transfering Files using Netcat
4
Remote Adminitration using Netcat
5
WireShark
6
Analysis WireShark traffic in a simple way
7
Another WireShark Example

Passive Information Gathering

1
Gather Passive Information
2
Easy Way to get crtical information
3
Passive Information 1
4
Gathering Personal Information
5
Maltego
6
Using Maltego
7
Related Entities in Maltego
8
More Maltego
9
Google Hacking
10
Google Search Operator

Active Information Gathering

1
NMAP
2
Sweeping the network
3
Get more details about the victim
4
NMAP NSE Scripts
5
Zenmap
6
SMB Enumeration
7
SMB Null Session
8
DNS Enumeration
9
DNS Zone Transfer
10
Enum4Linux

Password Attacks

1
Password attack
2
XHydra
3
SSH Cracking
4
Ncrack
5
Ncrack Different OS
6
Use The right Wordlist
7
Crunch
8
The Most amazing and effective Wordlist
9
Final Word about Password attack

Web Application Attacks

1
SQL Injection Introduction
2
What is SQL Injection
3
Setup your web application lab
4
Is The site infected with SQLI
5
The Amazing SQLMAP
6
Live Example

Network Attacks

1
Introduction to Network Attacks
2
Enable Routing
3
MITM attack using ettercap
4
Start Xplico
5
Ettercap and Xplico attack
6
WireShark and Xplico
7
DNS Spoofing
8
DNS Spoofing attack

Social Engineering

1
Social Engineering Introduction
2
Spoofed Email
3
Social Engineering Toolkit
4
Fixing Set
5
Credential Harvest
6
Another-SET-Attack-1
7
Another-SET-Attack-2
8
Meterpreter Sessions

Working with Exploit

1
Working with exploit
2
Metasploit
3
Using Meterpreter session
4
Armitage
5
Fixing armitage
6
Armitage in Action
7
Different Armitage usage
8
Armitage Example 2
9
Network Penetration using Armitage

Remote attacks

1
Port Forwarding
2
Hacking Remotely Demonstration

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 81

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network

Hacking using Kali Linux Course
Price:
$160