Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Kali Linux for Advanced Pen Testing and Ethical Hacking

via LinkedIn Learning

Overview

Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.

Syllabus

Introduction
  • Using Kali Linux as the basis for advanced penetration testing
  • What you should know
  • Disclaimer
1. Kali Basics
  • Testing with Kali Linux
  • Understanding Kali deployments
  • Preparing your toolbox
  • Preparing to use exploits for testing
  • Managing the Kali menu
  • Using the LinkedIn Learning penetration testing lab
2. System Shells
  • Introduction to shells
  • Exploring Kali webshells
  • Weeving a shell
  • Generating shellcode with msfvenom
  • Injecting images with jhead
  • Using shellcode in exploits
3. Exploiting Targets from Kali
  • Exploiting systems with Kali
  • Exploiting with Python
  • Exploiting with Perl
  • Exploiting with C
  • Exploiting with CPP
4. Passwords
  • Obtaining Windows passwords
  • Obtaining Linux passwords
5. Exploiting the Metasploitable Server
  • Targeting Metasploitable
  • Exploiting VSFTPD
  • Exploiting with ProFTPD
  • Exploiting Tomcat
  • Exploiting IRC
  • Exploiting the distributed compile system
  • Exploiting network files
  • Hiding in plain sight
  • Escalating to root
6. End-to-End Testing
  • Starting with online labs
  • Exploiting rejetto
  • Exploiting the Devel
  • Time to exploit Cronos
  • Cronos revisited: Getting to the root
  • Using a nightmare escalator
Conclusion
  • Next steps

Taught by

Malcolm Shore

Reviews

4.7 rating at LinkedIn Learning based on 331 ratings

Start your review of Kali Linux for Advanced Pen Testing and Ethical Hacking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.